1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
4 years ago
6

Why is there always ads i just want answers and I find the question I'm looking for and then a annoying ad look at sitejabber br

ainly no one likes the ads and you know this sincerely tell me why dont close this post a comment tell me why and when i say you can close it then you can close it
TL,DR i dont like ads all the time tell me why
Computers and Technology
1 answer:
Artist 52 [7]4 years ago
6 0

Answer:

then upgrade to a subscription

You might be interested in
What’s a sign you should talk to an adult about your online time
vesna_86 [32]

Answer:

If your are getting bullied or getting depressed about something in the internet, you should talk with a adult.

4 0
3 years ago
Read 2 more answers
An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
babunello [35]

The S3 encryption, <u>Server-Side Encryption with Customer-Provided Keys (SSE-C)</u>, allows the company to leverage Amazon S3 for storing data with given constraints.

What do you mean by S3 encryption?
S3 encryption <u>encrypts your </u><u>data </u><u>when it is written to disks in its </u><u>data </u><u>centers at the </u><u>object </u><u>level and decrypts it for you when you </u><u>access </u><u>it.</u> There is no distinction between accessing encrypted or unencrypted items as long as you authenticate your request and you have access permissions.

S3 encryption<u> </u><u>encrypts an item before saving it to disk when you use server-side </u><u>encryption</u><u>; the </u><u>object </u><u>is then decrypted when you download the object</u>. S3 encryption lets you safeguard the data you store in AWS S3 buckets online, which is crucial for sensitive data.

To learn more about S3 encryption, use the link given
brainly.com/question/9979590
#SPJ4

4 0
1 year ago
Which of the following is not an algorithm?
Kipish [7]

Answer:

The correct answer is: "D. shapoo instructions (lather, rinse, repeat)".

Explanation:

Among the options given, letter D is the only one which does not apply and  may not function as an algorithm. An algorithm is a set of rules and/or instructions which aims at solving a problem and/or task, therefore, "shapoo instructions" do not classify as an algorithm because they are only written informations to explain how to use a product (lather, rinse, repeat), rather than setting a procedure for solving a problem in terms of technology tools. All the other options are examples of algorithms because they already exist as such and also function as technology tools.

(ps: mark as brainliest, please?!)

7 0
3 years ago
Mark and his team are working on a project that is due for delivery in the next few days. The team is using project management t
meriva

Answer:

The correct option is;

B. Managing change

Explanation:

Change management is a process of applying methods and instruments that bring about the implementation of required changes in an organization or project such that the changes are carried out in a seamless and timely manner using a carefully laid out and thorough approach that reduces the impact of the change on the quality of service and that handles the disruptions in the project or organization brought about by the change

7 0
3 years ago
A good algorithm should have which three components?
laila [671]

Answer:

a good algorithm must be able to accept a set of defined input. Output: a good algorithm should be able to produce results as output, preferably solutions. Finiteness: the algorithm should have a stop after a certain number of instructions. Generality: the algorithm must apply to a set of defined inputs.Explanation:

7 0
3 years ago
Other questions:
  • What is the use of pecil icon
    11·2 answers
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • How is counting in this circle and square system similar to how we count in our regular lives? How is it different?
    15·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • opy the code below into the coderunner window. Debug the code so that it outputs the verses correctly. a = input("Enter an anima
    14·1 answer
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • What is wrong with the following code?
    11·1 answer
  • 6. Find the volume of the figure. Round your answers to the nearest
    11·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!