1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
11

Converting terminology via computers is called

Computers and Technology
2 answers:
Hatshy [7]3 years ago
8 0

This is called Cryptography

Vitek1552 [10]3 years ago
5 0

Hi Bentley


Converting terminology via computers is called a Cryptography


I hope that's help !



You might be interested in
Write chracteristics of all 5 generation of computer​
jeka94

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

3 0
3 years ago
Read 2 more answers
Which mechanical switches are the loudest and clickiest?
telo118 [61]

Answer:

1.Cherry MX Blue

2.most expensive is Gateron Blue

3 0
3 years ago
The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve
Aneli [31]

Answer:

Insights gathered from big data can lead to solutions to stop credit card fraud, anticipate and intervene in hardware failures, reroute traffic to avoid congestion, guide consumer spending through real-time interactions and applications, and much more. The benefits of big data are felt by businesses too

Explanation:

4 0
3 years ago
Read 2 more answers
The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
dangina [55]

Answer:

The method definition to this question can be given as:

Method definition:

public void clear(int[] arr, int num) //define method clear.

{

   if (num == 0) //if block

{

       return 0;  return value.

}

else //else block

{

 arr[num - 1] = 0; //assign value in arr.

return arr[];  //return value.

}

}

clear(arr, num - 1);   //calling

Explanation:

The description of the above method definition as follows:

  • Firstly we define a method that is "clear" that does not return any value because its return type is "void". This method accepts two integer variables that are "arr[] and num" where arr[] is an array variable and num is an integer variable.
  • Inside a method, we use a conditional statement in if block we check that num variable value is equal to 0. if this condition is true so, it will return 0 otherwise it will go to else block in else block it will assign value in variable arr[num-1] that is "0" and return arr value.

4 0
4 years ago
30 points
Murljashka [212]
The answers are Library Catalog access, Simultaneous access, 24/7 availability, and database resources. No physical boundary and systems are also viable options but brick and mortar access is definetely not one.
3 0
3 years ago
Other questions:
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • Help pls<br><br> What type of link is used to call this file?
    5·2 answers
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
    9·1 answer
  • I need help, thank you
    5·1 answer
  • Which of the following is NOT a reason why supply chain infections areconsidered especially dangerous?
    8·1 answer
  • Becuase privacy is personal customers, where should your data privacy efforts align?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!