1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
7

A file containing user information which is transmitted from an online server and attached to your web browser and stored on you

r hard drive is called what?
Computers and Technology
1 answer:
rewona [7]3 years ago
5 0
The answer is: <span>Cookie</span>
You might be interested in
1.) How do parks and other green spaces benefit a community?
vagabundo [1.1K]
#1 is A and #2 is B, but I don't know about #3 and #4.
8 0
3 years ago
Briefly describe the software quality dilemma in your own words
Dahasolnce [82]

Answer:

 software quality dilemma is a situation where there is confusion regarding what should we prioritize : a good quality work or a fast paced work. In software development , many a times there will be deadlines to achieve, in such cases software quality dilemma is bound to occur. A developer would have to choose between writing and optimized and well commented code or just get the job done without proper optimized or reviews. In same lines, many companies have to decide between regular reviews and expert opinions of a product for good software quality or bypass them to meet budgets and deadlines.

6 0
3 years ago
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
1 year ago
A company has two finalists in mind to run its computer network: Bill, a college graduate in computer science with little experi
irga5000 [103]
Sam has more experience
5 0
3 years ago
Why does an annular eclipse occur when the moon is between the sun and Earth, but is too far from Earth for a total eclipse?
velikii [3]

Answer:

Moon Is Far from Earth

Explanation:

The reason we can see the glowing outer edge of the Sun at the maximum point of an annular eclipse is that it happens while the Moon is near its farthest point from Earth, called apogee, when the Moon is smaller than the Sun when viewed from Earth.

5 0
3 years ago
Other questions:
  • PLEASE HURRY
    6·1 answer
  • What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
    12·1 answer
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    14·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
    8·2 answers
  • What is the component on the motherboard that confirms all devices are in working order once the computer is turned on?
    13·1 answer
  • I need help picture above
    14·2 answers
  • Documental acerca de los principales materiales que se emplean en la fabricación de medios técnicos utilizados en una oficina.
    9·1 answer
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!