1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
8

How much electricity is in the human brain? ​

Computers and Technology
2 answers:
BlackZzzverrR [31]3 years ago
6 0

Answer:

On average, at any given moment, your brain's electricity is outputting roughly 0.085 Watts of power.

Explanation:

IgorC [24]3 years ago
4 0

Answer:

roughly 0.085 Watts of power.

Explanation:

You might be interested in
Explain the different types of computer software programs. Be specific and use examples.
lorasvet [3.4K]

Answer: well there are many types of software out there and let's use Microsoft for an example there a really protective company so more people would want to buy from Microsoft they have a lot of high-tech computers so and I'm not favoriting Microsoft it's just what I've use Chrome also is really good but you would kind of want to go off like reviews that you see and everything like that because I'm not a big computer tech but that's just what I know

Explanation:

3 0
3 years ago
In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
Irina18 [472]

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

4 0
3 years ago
Read 2 more answers
Which format is used for audio files?
Arisa [49]
Audio format is used for audio files
7 0
3 years ago
Read 2 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
scoray [572]

Answer:

oh wowwwwwwwww

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • You write a short story, but you want to make sure your work is protected before you post it online. What should you do to help
    7·1 answer
  • Words that have a special meaning in a programming language are called
    13·1 answer
  • 100 POINTS + BRAINLYEST TO FIRST PERSON THAT IS CORRECT!!! Which items can be found in the Properties section of the Backstage V
    15·2 answers
  • / Looks up author of selected books
    15·1 answer
  • Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
    7·1 answer
  • calculate how many turns of cable you will need on the drum for your cage and skip to move up and down by 500 m​
    12·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
  • Drag the tiles to the boxes to form correct palrs.
    9·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
  • What is a simple definition for electricity?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!