1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
5

I have an online test today and it’s in the canvas platform. When I enter the test it says that I need an access code and that I

need to ask my teacher for it but my teacher doesn’t answer my emails. The test is due today. What should I do? Is there anyway I can hack to guess the code or something?
Computers and Technology
1 answer:
Artist 52 [7]3 years ago
7 0
I recommend calling the school I don’t things there’s a way to hack into cause I’ve tried. I’m sorry this happened.
You might be interested in
Allowing every communication is a bad idea from a security standpoint as well as a productivity one.TrueFalse
s344n2d4d5 [400]

Answer:

The answer to this question is True.

Explanation:

If we allow every communication this will not be a great idea if we want better security and better productivity.

There will be a lot of spam communications so the productivity and the security will also degrade because of that.

So if we want better productivity and security we have to allow a certain number of connections.

Hence the answer to this question is True.

4 0
3 years ago
Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "
Phoenix [80]

Answer:

There are no statements in the question, so I explained the whole code.

Explanation:

A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.

For example, map.put("123", "John Smith");   -> key = 123, value = John Smith

Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.

Note that the key 222 also has Steve Yao for the value, that is totally acceptable.

5 0
2 years ago
Which statement describes the primary purpose of JavaScript?
cupoosta [38]

a.The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.

<u>Explanation:</u>

On web pages before submitting the day, end user has to do client validations such as whether data enter is correct data type,  so end user for  client side validation been eiher by VBSCRIPT (visual basic script language) or (JavaScript java script).  Internet explorer or Microsoft edge uses VBSCRIPT for web page validation.

For visual basic script languages end user should have enough knowledge   on visual basic programming languages. Same away for java script end user have enough knowledge on c language.

Both Scripts are used for client side validation on success of validation end user will submit web page form for next action. JavaScript is used in most of the browser including Microsoft explorer or Microsoft edge.

5 0
2 years ago
Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If b
Alinara [238K]

Answer:

As a design rule, access points within range of each other should be set to channel frequencies with minimal signal overlap. Users will find that roaming doesn’t work well, and performance will degrade because of interference between access points.

Explanation:

8 0
3 years ago
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
1 year ago
Other questions:
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • In 2d design, form makes what possible?
    15·1 answer
  • A researcher plans to identify each participant in a certain medical experiment with a code consisting of either a single letter
    10·1 answer
  • Just answer in five-line. Question:
    9·1 answer
  • Unemployment can be viewed as
    14·1 answer
  • When does a soft page break occur in a document
    9·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • Repeated execution of a set of programming statements is called repetitive execution.
    7·1 answer
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
  • Mille gets a text from her friend asking if she wants to come over. It seems like a bit of a hassle to go to her friend's house,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!