1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
8

The most secure form of encryption is referred to as

Computers and Technology
1 answer:
kherson [118]3 years ago
3 0

Answer:

the answer is b. WPA

Explanation:

You might be interested in
How do i divid 521 to the nearest tenth
Softa [21]

Answer:

520

Explanation:

take 521 round that to the nearest 10th and thats 520

8 0
4 years ago
Read 2 more answers
How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
Cloud [144]
The yearly salary is xx,xxx just add some stuff in front maybe in back
6 0
4 years ago
A key benefit of inheritance is Group of answer choices an object can have several types, it is type compatible with any of its
NARA [144]

Answer:

A key benefit of inheritance is: an object can have several types, it is type compatible with any of its super classes

Explanation:

  • Inheritance is one of the fundamental concepts of Object Oriented Programming.
  • Inheritance allows classes (derived classes) to inherit the methods and properties of a class (base class).
  • The class or classes that inherits the characteristics from another class is called a derived class, child class or sub class. Derived class can also has it own methods and attributes additionally.
  • The class whose methods and properties are inherited by the derived class or classes is called a base class, super class or a parent class.
  • Benefit of inheritance is that inheritance new objects can take properties of existing objects and an object can have many types.
  • Also a child class can inherit from more than one super classes which is called multiple inheritance.
  • Multiple inheritance allows a class to implement more than one abstract classes.
  • An object can have several types. These types can be of an object's own class and also other types which include all classes that a class inherits.
  • If a variable is declared to be the type of super class then value of that variable can refer to any instance that instantiated from any class that inherits that super class. This means that an object is type compatible with an of its super classes.
8 0
3 years ago
What does the hard drive do
Gnoma [55]

The most important characteristic of a hard drive is how much data the hard drive can store, referred to as the storage capacity. A typical internal hard drive for a new desktop computer or laptop has a storage capacity of several hundred gigabytes

8 0
4 years ago
Read 2 more answers
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
Other questions:
  • Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market
    5·1 answer
  • The inflexible, circular platters on ____ disks use magnetic particles to store data, instructions, and information.
    5·1 answer
  • Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges.
    13·1 answer
  • What is a Software Quality Assurance Audit?
    12·1 answer
  • Your ASP.NET page contains a page-level variable of Customer type. You want to preserve the value of this variable across page p
    11·1 answer
  • A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting
    7·1 answer
  • What type of link is used to call this file shown below?
    5·1 answer
  • You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write th
    5·1 answer
  • Click print to publish your post in a blog true or false.​
    5·2 answers
  • What is wrong with line 3 ?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!