1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
10

???????????????????????​

Computers and Technology
1 answer:
lianna [129]3 years ago
3 0

Answer:

nobody is going to do this for 5 points...

You might be interested in
Use the __________ property to configure bold text using css
tatuchka [14]
Use the 'font-weight' property.

To put it in perspective, 'font-weight: 400' is the same boldness as normal text, whereas 'font-weight' 700 is the same boldness as a regular bold font.
5 0
4 years ago
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
What command do you use to set the suid bit on a script?
Debora [2.8K]
Unix/Linux question, cool.

<span>Typically we'd use chmod with +s in there.

chmod u+s script


</span>
5 0
3 years ago
In almost all cases, touching power lines or coming into contact with energized sources will result in what? Select the best opt
vichka [17]

Answer:

Severe injuries or death

Explanation:

4 0
3 years ago
The concept of "plug and play" is demonstrated by which of the following<br> scenarios?
bagirrra123 [75]

Answer:

Farah has completed a post-secondary education program and is now ready to begin working, without additional training, on her first day .

Explanation:  HoPe ThIs HeLpS

6 0
3 years ago
Other questions:
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • What is the difference between images and pictures
    6·1 answer
  • Typically, what form do most database designers consider a database structure to be normalized?
    15·1 answer
  • A flowchart that depicts the relationships among the input, processing, and output of an AIS is
    6·1 answer
  • Way to minimize technical problems with your computer
    6·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • What, if anything, is returned by the method call rearrange ("apple")?
    8·1 answer
  • Is brainly bugging out rn? <br> The site isnt like loading completely
    5·1 answer
  • you are tasked with managing multiple servers. you want to manage them all from one server manager interface so you don't have t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!