1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
4 years ago
11

Which formula would you use to round the number in cell b5 to the nearest 10? is it a b c or d?

Computers and Technology
1 answer:
Mars2501 [29]4 years ago
7 0
B I'm not sure I'm in 4the grade are you talking about excel spreadsheet
You might be interested in
​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and
SCORPION-xisa [38]

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

3 0
3 years ago
In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastruc
vladimir1956 [14]

Answer:

Remote Access Domain

Explanation:

Remote access Domain allows users to enter into system network through VPN.

8 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Why doesn't brainly give me 15 questions a day
Lilit [14]
I’m not sure how to answer that
8 0
3 years ago
Read 2 more answers
A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software
NeX [460]

In the case above, The system engineer has witnessed a Failover.

<h3>What is the use of Server cluster?</h3>

This is known to be a tool that makes a website to be able to run smoothly and it gives little glitches and a better user experience.

Therefore, In the case above, The system engineer has witnessed a Failover.

See full question below

A systems engineer is managing a server cluster. A memory fault has occurred in one of the active servers; the cluster software has caused another server in the cluster to become active. The system engineer has witnessed a:

a. Pairing

b. Failover

c. Load balance

d. Synchronization

Learn more about  cluster software from

brainly.com/question/2749543

#SPJ1

7 0
2 years ago
Other questions:
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • To add another worksheet to an Excel file, click on the _____
    15·1 answer
  • What typed of google group is best-suited for an online study group?
    7·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • Where was the first type of computer found
    8·2 answers
  • String member function compare compares two strings (or substrings) and returns 0 if:
    5·1 answer
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw ca
    13·1 answer
  • 5. In which of the following stages of the data mining process is data transformed to
    9·1 answer
  • When a file is used by a program, there are three steps that must be taken:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!