1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
7

HEY DO U LIKE TRAINS!

Computers and Technology
1 answer:
Triss [41]3 years ago
3 0

Answer:

yes

Explanation:

yes

You might be interested in
Which focal length and aperture combination is most likely to give you a deep depth of field?
frutty [35]

Answer:

f/11 is the answer I think

3 0
2 years ago
Programa que previene, detecta y elimina virus informáticos.
vesna_86 [32]

Answer:

Software antivirus

Explanation:

6 0
2 years ago
A personal computer uses a number of chips mounted on a circuit board called
Vesnalui [34]
The answer is d.mother board 

7 0
3 years ago
In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an internally identifi
erma4kov [3.2K]

Answer:

The correct option to the following question is D.).

Explanation:

SDLC stands for the System Development Life Cycle.

The aim of the SDLC is to produce the high quality of the software that exceeds or meets the reaches completions and customers' expectations with costs and time expectations.

Software Development Life Cycle is the frameworks that defining the task performed at each of the steps in software development process.

8 0
3 years ago
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
9 months ago
Other questions:
  • To go to a specific cell, press the function key
    9·1 answer
  • WILL GIVE BRAINLIEST! I'm doing a project at school. Does anyone have any good explanations for Digital Art? I need it to be at
    13·2 answers
  • Define a JavaScript function named showGrades which does not have any parameters. Your function should create and return an arra
    5·1 answer
  • _____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving lo
    7·1 answer
  • HELP 15 POINTS
    12·2 answers
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • Q1). Write a python program to pass a list to a function and double the odd values and half even values of a list and display li
    12·1 answer
  • Say true or false
    10·2 answers
  • Ginny just enrolled in a C-SNP that uses the post-enrollment verification method. When will the plan send her a termination noti
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!