1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
5

If you are uploading files you plan to edit online, you will need to convert them to Google Drive format. T or F

Computers and Technology
1 answer:
Amiraneli [1.4K]3 years ago
5 0

Answer:

save as a word document (.docx) to keep editing offline then copy and paste into the google doc

You might be interested in
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
MatroZZZ [7]

Answer:

-Click insert

-Click picture

-Click from file

-Right click the picture

-Select the desired picture and again click Insert

-Click insert caption

-Write the caption and add it

Explanation:

6 0
3 years ago
2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho
Kruka [31]

Answer:

There are two better techniques for encryption as compared to shift cipher. One is block cipher. Such techniques use one key for both encryption and decryption. For example Advanced Encryption Standard (AES). This is based on symmetric key encryption.

The other way is to use asymmetric key encryption technique which based on two keys i.e. public and private key for encryption and decryption. For example, Rivest-Shamir-Adleman (RSA).

Explanation:

What is AES?

Advanced Encryption Standard (AES) is a symmetric key block cipher  which uses 128, 192 or 256-bit keys  length to encrypt and decrypt a block of plain text or message. It is stronger and faster than Shift Cipher encryption technique. It can encrypt data blocks of 128 bit using the above mentioned bit key lengths. The greater then key length the greater the security. the number of rounds in AES is variable and depends on the length of the key. The length of these keys determines the number of rounds for example 128 bit keys has 10 rounds, 12 rounds for 192 bit keys and 14 rounds for 256 bit keys. Each rounds involves some processing. This process is explained below:

How AES works?

The data is divided into each of size 128 bits makes a matrix of 4x4 columns of 16 bytes. (bytes because AES takes 128 bit plain text block as 16 bytes)

Substitution: First the data is substituted using a fixed substitution table which is predetermined. This makes a matrix of rows and columns.

Shifting: Each rows of the matrix is shifted to the left and the dropped entries in row are inserted on the right. Shift is carried out as follows −  

Mixing columns: Use a mathematical method/equation to transform the columns where the input of the method is each column of data which is then replaced by this function into a different new matrix of data(bytes). This is basically the first round to transform plain text to cipher text. Now consider these bytes as 128 bits, the first round key is added to these resultant column bits by XOR. A separate portion of the encryption key length is used to perform the transformation on each column. The number of rounds depend on the the key length.

After the first round key comes the second round key and so on and when the last round key is added then this whole process goes back to Substitution phase, then shifting rows phase, then mixing columns and another round key is added after this. For example, if 128 bit key is used this means there will be nine such rounds.

Advantages

AES supports large key sizes which makes it more secure and stronger than shift cipher encryption techniques which can be cracked because of their small key space. If someone wants to decrypt a message and knows it's encrypted by a Shift Cipher technique then the key space of all possible keys is only the size of the alphabet. This is a very small scale.  An attack such brute force attack attempting all 26 keys or even using exhaustive technique will easily crack this. So AES having large key size is more robust against cracking. For example in AES in order to crack an encryption for 128 bit around 2128 attempts are needed. Also for a 256 bit key, 2256 different combinations attempts are needed to ensure the right one is included which makes it harder to crack and makes is more secure.

I have used an internet solver to encrypt a string and i am attaching the result of the encryption. The plain text is: Two One Nine Two

The key is Thats my Kung Fu

and the cipher text in hexadecimal after using AES is:

29 c3 50 5f 57 14 20 f6 40 22 99 b3 1a 02 d7 3a

8 0
3 years ago
All of the following are common causes of electrical accidents and injuries, EXCEPT:
mote1985 [20]
<h3>✽ - - - - - - - - - - - - - - - ~<u>Hello There</u>!~ - - - - - - - - - - - - - - - ✽</h3>

➷ It would be D. I don't really see how the plug itself is a cause of electrical accidents.

<h3><u>✽</u></h3>

➶ Hope This Helps You!

➶ Good Luck (:

➶ Have A Great Day ^-^

↬ ʜᴀɴɴᴀʜ ♡

7 0
3 years ago
In the classic experimental design, there are two groups: the _____ group and the _____ group.
Tju [1.3M]

Main Answer:In the classic experimental design, there are two groups: the <u>treatment group and the control group.</u>

<u>Sub heading:</u>

<u>Explain treatment group and control group?</u>

Explanation:

1.The treatment group also known as the experimental group receives the treatment that the researcher is evaluating.

2.the control group  on the other hand does not receive the treatment.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

5 0
1 year ago
Other questions:
  • In the movie evacuees, why were the children evacuated from large cities?
    11·1 answer
  • If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
    7·1 answer
  • T is important to remember to print the return address when printing an
    5·1 answer
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a
    5·1 answer
  • Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insult
    14·1 answer
  • In order for a fault-block mountain to form, a ______ must take place along a fault line and one side must be ________.
    11·1 answer
  • I like to troll what about you
    10·1 answer
  • Read the following scenario what type of business letter do you think is required in this situation?
    12·2 answers
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!