1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
10

A_________is an orderly collection of fact & information.

Computers and Technology
1 answer:
sammy [17]3 years ago
4 0

Answer:

C. Database

Explanation:

You might be interested in
One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
Thepotemich [5.8K]

Answer:

This explanation is true.

Explanation:

The most common forms of encryption used today are;

  • Data Encryption Standard / DES
  • Triple DES
  • Advanced Encryption Standard / AES
  • Twofish

which are mostly symmetric encryption protocols. They use the same key codes for both parties involved in the communication process.

Asymmetric Encryption is widely used in daily communications that is done over the internet and it uses different keys for each party. The public key encrypts the message and then it is sent over to the recipient. The secret key which they have exchanged is then used the decrypt the message.

I hope this answer helps.

7 0
3 years ago
Explain the impacts of computer in education
Crazy boy [7]

Answer:

Please check the explanation.

Explanation:

The impact of computers in education has been absolutely phenomenal. Just imagine using your computer and having access to the internet, you can easily ask the question of a certain problem on Brainly, and many subject specialists on Brainly using their own computers can answer your query, helping you clear your concepts.

Some of the other advantages or positive impacts of computers in education.

  • Rapid communication between teachers, students, and administration
  • Rapid internet reference may be more productive than exploring lengthy books
  • Audio-visual aids during learning
  • quick information retrieval

Now, some of the negative impacts of computer in education

  • May encourage cheating opportunity
  • Students may get lazy in class as they know they can get online support
  • E-books may extinct paper books
  • Certain only resources have made their resources a profit factory
3 0
3 years ago
Read 2 more answers
For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
Shkiper50 [21]

Answer:

See the attached pictures.

Explanation:

See the attached pictures for explanation.

5 0
3 years ago
In the year, , the American Department of Defense put a military research network, called ARPANET online.
mario62 [17]

Answer:

November 21st of 1969.

Explanation:

In the year, 1969, the American Department of Defense put a military research network, called ARPANET online.

3 0
2 years ago
In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
Sphinxa [80]

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

5 0
3 years ago
Other questions:
  • Write a program that reads a list of scores and then assigns grades python
    9·1 answer
  • Which computer is the best for video cutting?
    11·2 answers
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • What are the different ways to represent compounds? Check all that apply. a structural formula a ball model a space-filling mode
    13·2 answers
  • A(n) _________ is a computer system which is part of a larger system which performs a dedicated function.
    8·1 answer
  • 4.5 code practice computer science
    5·1 answer
  • Which computer peripheral is used when you would like to use a DVD or CD?
    12·2 answers
  • What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!