1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
10

( answer goes here) are pictures that you can click on to tell your computer what to do.

Computers and Technology
2 answers:
rosijanka [135]3 years ago
8 0
Um what are you asking here?
Sloan [31]3 years ago
8 0

click the icons on your screen. hope this helps

You might be interested in
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
PLS ANSWER ASAP!!
cricket20 [7]

Answer:

1. = c

2.= a

3. = b

Explanation:

8 0
4 years ago
Xét bài toán QUẢN LÝ ĐÀO TẠO. Việc quản lý đào tạo tại một trường đại học có thể được mô tả vắn tắt như sau: Danh sách Giảng viê
gulaghasi [49]

Answer:

write in an English so we can help with that

5 0
3 years ago
What did major networks do to combat audience erosion in the 1990s?
S_A_V [24]

Answer: I think is 3. They acquired cable channels. They acquired cable operators.

Explanation:

6 0
4 years ago
Plato I need answers asap will
Alja [10]

Answer:

Thanks for the points  

Explanation:

3 0
3 years ago
Other questions:
  • When trying to solve a problem, Bret uses a logical, step-by-step formula called ________.
    15·1 answer
  • Once i have internet connection do i need anything else to surf the web
    6·1 answer
  • What does the line of red semicircles mean on a weather map
    11·1 answer
  • How do you autofit a column to fit the longest word in Microsoft Word?
    5·2 answers
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • Where Go to set up margins on a letter
    15·1 answer
  • The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
    12·1 answer
  • You have video-recorded a friend’s birthday party. You compressed the video so it uploads quickly. What are some signs that you
    10·1 answer
  • In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses mem
    15·1 answer
  • Testing components for satellites is a classic example of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!