1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
6

What are two names for the database that holds digital signatures provided by os manufacturers, such as microsoft and red hat?

Computers and Technology
1 answer:
qaws [65]3 years ago
7 0
<span>Key-enrollment Key & Key-exchange Key</span>
You might be interested in
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
Margaret [11]

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

6 0
3 years ago
Assume that source elements of length k are mapped in some uniform fashion into a target elements of length p. If each digit can
lukranit [14]

Answer And explanation

a)

r^k has 1/r^k probability guess the correct source

b)

Each element in r^p  is mapped by r^k / r^p . There are r^k^-^p  So there are  r^k^-^p -1 elements.

number of target elements = r^k^-^p

number of source elements = r^k^-^p -1

probability = r^k^-^p -1 /r^k

c) Probability of the correct target element

1/r^p

6 0
3 years ago
1. Write an application that prompts the user to enter the size of the side of a square, and then displays a hollow square of th
belka [17]

Answer:

import java.util.Scanner;

public class HollowSquare

{

public static void main(String args[])

{

Scanner scan = new Scanner(System.in);

int size;

System.out.print("Enter the size : ");

size = scan.nextInt();

if(size>=1 && size<=20)

{

for(int i=0; i<size; i++)

{

for(int j=0; j<size; j++)

{

if(i==0 || j==0 || i==size-1 || j==size-1)

System.out.print("*");

else

System.out.print(" ");

}

System.out.println();

}

}

else

System.out.println("Invalid size.");

}

}

4 0
3 years ago
Outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hirin
Sati [7]

Answer:

True

Explanation:

Outsourcing, in a general term, means getting help from an external source. In software development context, outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hiring an external vendor to design and create software. In outsourcing, a business employs the service of a third-party application developer to design and create a software.

Some reasons why companies outsource a service are;

i. Shortage or lack of experienced developer in-house.

ii. To save time. Outsourcing can help reduce time taken to develop a software application because companies tend to outsource a developer that has designed similar application(s) in the past.

iii. To reduce cost. Outsourcing can help save cost considerably.

3 0
4 years ago
What are human made materials ?​
jok3333 [9.3K]

Answer:

Natural materials may include wood, cotton, fur, or wool. Human-made materials may include plastic, rubber, glass, and Styrofoam.

4 0
3 years ago
Other questions:
  • What feature did we use to quickly apply the formatting shown in this image?
    9·1 answer
  • How many nibbles are in 18 bytes??
    5·1 answer
  • What change does NOT need to be made to the above cover letter excerpt before sending it to an employer? a. Remove background co
    6·2 answers
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • On a timeline, a milestone 11 years in the future will be to the
    7·1 answer
  • Let f be the following function: int f(char *s, char *t){char *p1, *p2;for(p1 = s, p2 = t; *p1 != ‘\0’&amp;&amp; *p2 != ‘\0’; p1
    6·1 answer
  • Animation timing is does not affect the
    10·1 answer
  • Describe at least two ways social media has impacted cybersecurity.
    10·1 answer
  • Using complete sentences post a detailed response to the following.
    9·1 answer
  • Technological advancements during the industrial age provided Americans with:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!