1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

55555,5555,555,55,5​

Computers and Technology
1 answer:
REY [17]3 years ago
6 0

Answer: Decreasing Function????????????????????????????????

Explanation:

I'm confused, but I'm still gonna try and answer

You might be interested in
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
Page No
ratelena [41]

Answer:

ila bgfffsg hqhffa hhfw ygga gha yqvvty1uh' fttyavt h5tfauv gtta76rq

5 0
3 years ago
____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various
gregori [183]

Answer:

E. Genetic algorithms

Explanation:

In Computer science, Genetic algorithms are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative.

6 0
3 years ago
Which protocol is considered to be a dominant protocol for local area networking?
SVETLANKA909090 [29]
ETHERNETis considered to be a dominant protocol for local area networking. 
Protocol refers to the formal guidelines and policies which are used to define communication between two or more devices over an internet network. Protocols govern the end to end processes of communication over the internet.
8 0
3 years ago
Which software development model focuses on refining a software system's current version in each subsequent development cycle?
Firdavs [7]
I think that would be D
 but i may be wrong
6 0
3 years ago
Other questions:
  • You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
    11·2 answers
  • As yall know its spoopy season. This means spoopy music! I am having a live stream on the Spoon app under the username teendrago
    11·1 answer
  • The _____ contains a series of sections designed to prepare students for the ACT
    14·2 answers
  • 1) Put the following in order from smallest to largest A) 1,500,000 bytes B) 2,000 kilobytes C) 0.01 petabytes D) 1 Terabyte E)
    8·1 answer
  • In a system using the fixed partitions memory allocation scheme, given the following situation (and using a decimal form): After
    9·1 answer
  • Several students are making presentations for a science class. The chart describes the concept that each student will present to
    10·1 answer
  • Wired network are the most reliable and provide the highest speed?
    7·1 answer
  • What happens in Word 2016 when the Home ribbon tab is clicked on?
    9·1 answer
  • Who Has any idea How to code?
    7·2 answers
  • What is the most common knowledge computer programmers need in order
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!