1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
4 years ago
12

Question 9.9. Encryption is BEST described as

Computers and Technology
1 answer:
Yuliya22 [10]4 years ago
7 0
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
You might be interested in
Interpretation is adding meaning to information by making connections and comparisons and by exploring causes and consequences.
Papessa [141]

Answer: True

Explanation: Interpretation is the way of finding about the conclusion or outcomes and tracing the relationships. Interpretation is based on the finding the conclusion based on the responses gained and observing the relationship that is being established.

It also works for finding the reason behind the result and comparison is done on the basis of the results achieved.Therefore, the given statement is true.

7 0
3 years ago
100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
klio [65]

Answer:

The two factors are:

  • The default gateway
  • The routers

Explanation:

<u>Default gateway:</u>

  • The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

<u>The routers:</u>

  • A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.
7 0
3 years ago
Java code?????
12345 [234]

Answer:

Explanation:

Here is the code for you:

import java.io.*;

import java.util.*;

class GirlScoutCookies

{

public static void main(String[] args)

{

int [] BoxesCategory = new int[5];

Scanner sc = new Scanner(System.in);

System.out.print("Total number of girls in the troop: ");

int numOfGirlScouts = sc.nextInt();

for(int i = 0; i < numOfGirlScouts; i++)

{

System.out.print("Boxes of cookies for girl #"+(i+1)+": ");

int boxes = sc.nextInt();

if(boxes >= 0 && boxes <= 10)

BoxesCategory[0]++;

else if(boxes >= 11 && boxes <= 20)

BoxesCategory[1]++;

else if(boxes >= 21 && boxes <= 30)

BoxesCategory[2]++;

else if(boxes >= 31 && boxes <= 40)

BoxesCategory[3]++;

else if(boxes > 40)

BoxesCategory[4]++;

}

System.out.println("TOTAL BOXES\tNUMBER OF GIRL SCOUTS");

System.out.println(" 0 to 10\t"+BoxesCategory[0]);

System.out.println("11 to 20\t"+BoxesCategory[1]);

System.out.println("21 to 30\t"+BoxesCategory[2]);

System.out.println("31 to 40\t"+BoxesCategory[3]);

System.out.println("41 or more\t"+BoxesCategory[4]);

}

}

And the sample output is:

5 0
3 years ago
Name the contributory components that are considered when determining an E/M code; they are not considered key components:
Vika [28.1K]

Answer:

time

Explanation:

E/M code is known as the evaluation and management code. The E&M code may be defined as the medical coding system which supports the medical billing process.  Every new patient is assigned a E/M code. The components that are not considered for determining the E/M code are coordination of care, the counselling, time and the nature of presenting problem.

7 0
3 years ago
What does Pentium means?:/
netineya [11]
Pentium is just a brand of a CPU chips from Intel that is usually in your laptops or chromebooks. It's used for general purpose computing. Produced by Intel since 1993. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
    8·1 answer
  • The efficiency of a screw is low because of _____. width friction length height
    10·2 answers
  • Do you think robots will take millions of jobs when they're put in different positions such as doctors or taxi drivers?
    7·1 answer
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • All of the following statements concerning project portfolios are true EXCEPT: ​ a. The projects in a portfolio are managed as a
    6·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • java Two smallest numbers Write a program that reads a list of integers, and outputs the two smallest integers in the list, in a
    6·1 answer
  • SOMEONE HELP ME PLEASE <br> What are three reasons technology is beneficial to teens
    11·1 answer
  • Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the log
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!