1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
7

NEED HELP NOW 25 POINTS WILL MARK BRAINLIEST!!!

Computers and Technology
2 answers:
erastova [34]3 years ago
6 0
The answers are:
C
A
Hope it helps :)
rewona [7]3 years ago
3 0
Number 3 would be the 3rd circle.

Number 5 is the 2nd circle.

Hope this helps

<span>
</span>


You might be interested in
A piece of glass has a thin film of gasoline floating on it. A beam of light is shining perpendicular on the film. If the wavele
kobusy [5.1K]

Answer:

200 nm

Explanation:

We need a constructive interference to see the bright reflection

we know that 2t=m\lambda  where m=1 and \lambda is the wavelength of the gasoline

so \lambda =\frac{560}{1.4}=400nm

putting the value of m and \lambda in thickness equation

t=\frac{1\times 400}{2}=200nm

so the thickness of the film will be 200 nm

3 0
3 years ago
How do I write my name in binary code?
Galina-37 [17]

Answer:

qUE

wHAT CODE

Explanation:

4 0
3 years ago
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw
hjlf

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

4 0
3 years ago
Long-term memory used by the computer:
Fynjy0 [20]
The long term memory used by the computer is called “RAM”
6 0
2 years ago
Read 2 more answers
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
Other questions:
  • what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for l
    7·1 answer
  • What type of lights are necessary for silhouettes?
    12·2 answers
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • Describe how using active listening at work can help you be a better employee.
    15·1 answer
  • What test is most similar to binary​
    9·1 answer
  • A USB zipper drive is a small data storage device that plugs into a computer's USB port.
    14·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • Maggle is preparing a document. She wants to open the help menu to sort out a formatting problem. Which key should she press to
    11·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Why do Selection Sort and Insertion Sort’s outer loops run 11 iterations if there are 12 elements in the array?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!