1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
5

Which are among the ways you can use bitlocker encryption? (choose all that apply?

Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
3 0
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
You might be interested in
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
What is the type of data in the list [103, 405, 527, 396, 503]?
Mariulka [41]

Answer:

alphanumeric.........

3 0
2 years ago
Read 2 more answers
When a percentage of the smallest and largest values are deleted from a data set, the mean of the remaining data values is the a
xz_007 [3.2K]

Answer:

Correct option C

Trimmed mean

Explanation:

A trimmed mean is a method of averaging that removes a small designated percentage of the largest and smallest values before calculating the mean.

Trimmed mean helps eliminate the influence of data points on the tails that may unfairly affect the traditional mean.

Trimmed means are used in reporting economic data in order to smooth the results and paint a more realistic picture.

5 0
3 years ago
Note: You can use a word document to write your answers and copy-paste your answer to the area specified. a. (5 points) Convert
MrMuchimi

Answer:

EA9_{16} = 3753

CB2_{16} = 3250

(1011 1110 1101 1011 1010)_2 = 781754

(1010 1000 1011 1000 1110 1101)_2 = 11057389

(1011 1110 1101 1011 1010)_2 = BEDBA

(1010 1000 1011 1000 1110 1101)_2 =  A8B8ED

74510_8= 221416

67210_8 = 203212

Explanation:

Solving (a): To base 10

(i)\ EA9_{16

We simply multiply each digit by a base of 16 to the power of their position.

i.e.

EA9_{16} = E * 16^2 + A * 16^1 + 9 * 16^0

EA9_{16} = E * 256 + A * 16 + 9 * 1

In hexadecimal

A = 10; E = 14

So:

EA9_{16} = 14 * 256 + 10 * 16 + 9 * 1

EA9_{16} = 3753

(ii)\ CB2_{16}

This gives:

CB2_{16} = C * 16^2 + B * 16^1 + 2 * 16^0

CB2_{16} = C * 256 + B * 16 + 2 * 1

In hexadecimal

C = 12; B =11

So:

CB2_{16} = 12 * 256 + 11 * 16 + 2 * 1

CB2_{16} = 3250

Solving (b): To base 10

(i)\ (1011 1110 1101 1011 1010)_2

We simply multiply each digit by a base of 2 to the power of their position.

i.e.

(1011 1110 1101 1011 1010)_2 = 1 * 2^{19} + 0 * 2^{18} + 1 * 2^{17} + 1 * 2^{16} +1 * 2^{15} + 1 * 2^{14} + 1 * 2^{13} + 0 * 2^{12} + 1 * 2^{11} + 1 * 2^{10} + 0 * 2^9 + 1 * 2^8 +1 * 2^7 + 0 * 2^6 + 1 * 2^5 + 1 * 2^4 + 1 * 2^3 + 0 * 2^2 + 1 * 2^1 + 0 * 2^0

(1011 1110 1101 1011 1010)_2 = 781754

(ii)\ (1010 1000 1011 1000 1110 1101)_2

(1010 1000 1011 1000 1110 1101)_2 = 1 * 2^{23} + 0 * 2^{22} + 1 * 2^{21} + 0 * 2^{20} +1 * 2^{19} + 0 * 2^{18} + 0 * 2^{17} + 0 * 2^{16} + 1 * 2^{15} + 0 * 2^{14} + 1 * 2^{13} + 1 * 2^{12} +1 * 2^{11} + 0 * 2^{10} + 0 * 2^9 + 0 * 2^8 + 1 * 2^7 + 1 * 2^6 + 1 * 2^5 + 0 * 2^4 + 1*2^3 + 1 * 2^2 + 0 * 2^1 + 1 * 2^0

(1010 1000 1011 1000 1110 1101)_2 = 11057389

Solving (c): To base 16

i.\ (1011 1110 1101 1011 1010)_2

First, convert to base 10

In (b)

(1011 1110 1101 1011 1010)_2 = 781754

Next, is to divide 781754 by 16 and keep track of the remainder

781754/16\ |\ 48859\ R\ 10

48859/16\ |\ 3053\ R\ 11

3053/16\ |\ 190\ R\ 13

190/16\ |\ 11\ R\ 14

11/16\ |\ 0\ R\ 11

Write out the remainder from bottom to top

(11)(14)(13)(11)(10)

In hexadecimal

A = 10; B = 11; C = 12; D = 13; E = 14; F = 15.

(11)(14)(13)(11)(10)=BEDBA

So:

(1011 1110 1101 1011 1010)_2 = BEDBA

ii.\ (1010 1000 1011 1000 1110 1101)_2

In b

(1010 1000 1011 1000 1110 1101)_2 = 11057389

Next, is to divide 11057389 by 16 and keep track of the remainder

11057389/16\ |\ 691086\ R\ 13

691086/16\ |\ 43192\ R\ 14

43192/16\ |\ 2699\ R\ 8

2699/16\ |\ 168\ R\ 11

168/16\ |\ 10\ R\ 8

10/16\ |\ 0\ R\ 10

Write out the remainder from bottom to top

(10)8(11)8(14)(13)

In hexadecimal

A = 10; B = 11; C = 12; D = 13; E = 14; F = 15.

(10)8(11)8(14)(13) = A8B8ED

So:

(1010 1000 1011 1000 1110 1101)_2 =  A8B8ED

Solving (d): To octal

(i.)\ 74510

Divide 74510 by 8 and keep track of the remainder

74510/8\ |\ 9313\ R\ 6

9313/8\ |\ 1164\ R\ 1

1164/8\ |\ 145\ R\ 4

145/8\ |\ 18\ R\ 1

18/8\ |\ 2\ R\ 2

2/8\ |\ 0\ R\ 2

Write out the remainder from bottom to top

74510_8= 221416

(ii.)\ 67210

Divide 67210 by 8 and keep track of the remainder

67210/8\ |\ 8401\ R\ 2

8401/8\ |\ 1050\ R\ 1

1050/8\ |\ 131\ R\ 2

131/8\ |\ 16\ R\ 3

16/8\ |\ 2\ R\ 0

2/8\ |\ 0\ R\ 2

Write out the remainder from bottom to top

67210_8 = 203212

8 0
3 years ago
Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
rosijanka [135]

Answer:

<u><em>(1) Spam, (2) Trash.</em></u>

Explanation:

"<u><em>Emails are unsolicited-" is another word for spam</em></u> lol. <u><em>And then "Others she doesn’t need." is, again, another word for trash</em></u>. I mean if you don't need it is trash then.

WELP I hope I helped you even tho this is late. Ahem, well. <u><em>Stay awesome!</em></u>

8 0
3 years ago
Other questions:
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    7·1 answer
  • Gps receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directi
    5·1 answer
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
    12·2 answers
  • A(n) ________ is a specific type of computer program that manages all programs on a computer.
    8·1 answer
  • How can the font type of an existing style named No Spacing be changed?
    14·2 answers
  • Write down the numbering system from base 2 to 200​
    7·1 answer
  • IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who dem
    7·1 answer
  • What does a pencil icon in the row selector area indicate?
    7·1 answer
  • What are five don’ts of using a computer
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!