1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
8

Please help with attached file

Computers and Technology
2 answers:
Paul [167]3 years ago
8 0
Where is the attached file?
sergeinik [125]3 years ago
6 0
Where's the attached file
You might be interested in
Anyone else like hunter x hunter?<br> lets talk abt it uwu<br><br> good day :)
Aleks [24]

Answer:

mid

Explanation:

3 0
3 years ago
Read 2 more answers
After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people she featured in
GREYUIT [131]

Jemina can go to the editing command group and use the find and replace feature in order to correct her mistake in an efficient manner. Thus, the correct option for this question is A.

<h3>What is the Editing command?</h3>

The editing command may be defined as a type of command which is utilized to make corrections or modifications in an existing file. The line editor is a lower form of the ex-editor and is planned for beginners and is launched by the edit command.

By using the MS-DOS text editor also you are capable to edit, explore, construct, and adjust any text file on your computer. By becoming efficient and comfortable with the editor, people may recognize the more complicated features of the other editors as well.

Therefore, the correct option for this question is A.

To learn more about the Editing command, refer to the link:

brainly.com/question/3668326

#SPJ1

7 0
1 year ago
Read 2 more answers
Assume that someone dictates you a sequence of numbers and you need to write it down. For brevity, he dictates it as follows: fi
Basile [38]

Answer:

We have the following code in python with appropriate comments

Explanation:

line = input("Enter your line of integers: ")

# Splits at space

intList = line.split()

#initializing the count to 1

count = 1

#initializing the count to empty string

output = ''

#iterating over the list

for index, x in enumerate(intList):

 

#handling last index separately

if index == len(intList)-1:

if intList[index] == intList[index-1]:

output = output + str(count) + ' ' + str(intList[index])

else:

count = 1

output = output + str(count) + ' ' + str(intList[index])

 

#handling indexes other than the last index    

else:

 

if intList[index]==intList[index+1]:

count = count + 1 #if next integer is same, we increase the count by 1

else:

output = output + str(count) + ' ' + str(intList[index]) + ' '

count = 1

print(output)

6 0
4 years ago
Read 2 more answers
David would like to send mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?
stiks02 [169]

Mike's public key is used. When encrypting a message utilizing an asymmetric encryption algorithm, the individual performing the encryption does so using the recipient's public key.

<h3>What is Encryption?</h3>

Encryption exists as a method of scrambling data so that only authorized parties can understand the information. In technical terms, it stands for the process of converting human-readable plaintext to incomprehensible text, also understood as ciphertext.

In cryptography, encryption exists as the process of encoding information. This process transforms the original representation of the information, understood as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original data.

Encryption improves the security of a message or file by scrambling the content. To encrypt a message, you require the right key, and you need the right key to decrypt it as well. It stands as the most effective way to hide communication through encoded information where the sender and the recipient hold the key to deciphering data.

Symmetric-key algorithms exist algorithms for cryptography that utilize the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to proceed between the two keys.

Hence,  Mike's public key is used. When encrypting a message utilizing an asymmetric encryption algorithm, the individual performing the encryption does so using the recipient's public key.

To learn more about Encryption refer to:

brainly.com/question/9979590

#SPJ4

3 0
2 years ago
Amogus :0) owo have a good day y'all
prohojiy [21]

Answer:ghSlijhavicdhavghcugsadhsfghsa

Explanation:

4 0
3 years ago
Other questions:
  • What kinds of unstructured data or big data might the BITS corporation want to gather in the future? What kind of devices might
    14·1 answer
  • Is brainly down? Cant search anything
    8·1 answer
  • What does it mean by null in programming?
    9·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • Path of the signal of television
    6·1 answer
  • In computer Drag and Drop“ means to select the items, hold down the mouse and
    15·1 answer
  • What is information processing cycle​
    12·1 answer
  • 5) Match the following.
    12·1 answer
  • What is the difference between
    14·1 answer
  • What's good computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!