1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
11

(BRAINLIEST QUESTION!!!)

Computers and Technology
1 answer:
docker41 [41]3 years ago
4 0

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

You might be interested in
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
EastWind [94]

Answer: Insertion steganography

Explanation: Insertion steganography is the way of encrypting the data with the help of a regular files and message. It is encrypted by the ordinary files because the identification of files can be neglected. This process is carried out just for the protection purpose in extra form and gets decrypted  in the destination port .It has the working based on the replacement of the bits in a file .

8 0
3 years ago
Who should get the copyright credit for a piece of computer art: the CPU, the software, or the programmer? Explain your reasonin
yulyashka [42]

Answer:

The programmer.

Explanation:

The CPU (central processing unit or simply the processor) is the brain of the computer system, it processes data at a very fast rate depending on it's processing speed. But it only relates to speed of data processing and a link between components of the system.

A software is a program code at executes a task in the system. It a logical and follows an algorithm to solve a given task. Computer systems do not generate  lines of code by itself, but instead, A programmer writes the code to create the software used by the system.

6 0
3 years ago
In Microsoft Excel, you are working with a large worksheet. Your row headings are in column A. Which command(s) should be used t
slavikrds [6]

Answer:

The answer is "freeze panes command".

Explanation:

To see the row heading information into the columns "X, Y, and Z" we use the freeze panes command, which Pick's the cells from rows and on the right side of the columns, where you scroll.  

This tool allows you to block columns/row headings so, the first column /or top row will stay on the screen and you also scroll down or over to see the rest of the panel.

3 0
3 years ago
Which if the following is an example of tangible property?
lutik1710 [3]
It may have been a songlyrics
7 0
3 years ago
Your boss it trying to console into an old switch that he found in storage and wants to configure it. he asks you to describe wh
nika2105 [10]
I believe that the correct answer is c. look for a male connector with 9 pins.
5 0
3 years ago
Read 2 more answers
Other questions:
  • What operating system allows various teams in its office to network and collaborate on projects
    5·1 answer
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • What new deal programs were created to build dams to control flooding and generate electric power?
    13·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
    7·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • 1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
    5·1 answer
  • The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order
    5·1 answer
  • Suppose your team is finishing a project and the supervisor stresses ensuring the material cannot be erased. To what memory leve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!