1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
4 years ago
8

CORONAAAAAAAAAAA SUUUUUUUCKSSSSSSS

Computers and Technology
2 answers:
likoan [24]4 years ago
7 0

Periodddddddddddddddddd

Serhud [2]4 years ago
7 0

Answer:

yup :(

Explanation:

but we can take this time to slow down and spend time with our family :)

You might be interested in
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
How do we add questions on sam Blockly?​
Blizzard [7]

Answer:

I do not know that answer

5 0
3 years ago
What does core mean? what are they for?​
xeze [42]

Answer:

what does core mean? what are they for?​

Explanation:

A core is located inside the CPU its the part that gives instructions to software to preform a certain task, the more cores, the faster software can preform a task

4 0
3 years ago
Which version of Windows was considered an operating environment rather than an operating system?
maksim [4K]
The answer is A. Windows 1.O
4 0
4 years ago
What does manual exposure mean
Julli [10]
Amount of light per unit area
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • which of the following electromagnetic waves are not used for communication? a.gamma rays b.microwaves c.infrared waves d.radio
    5·1 answer
  • List and explain the error in the code
    14·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • Write an algorithm and flowchart to calculate sum of two given numbers​
    13·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • WHAT ARE SOME PROS AND CONS OF HYDROGEN FUELL CELLS
    11·1 answer
  • _____ provides the best video resolution. *<br><br> VGA<br> HDMI<br> USB<br> DVI
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!