1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
11

Three homework questions I can't figure out, please help?

Computers and Technology
1 answer:
Burka [1]3 years ago
8 0

It A

iT b

YOU CANT TRY THE TWO ONE THE WHO ARE WRITE

You might be interested in
Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
LenaWriter [7]

Answer:

The answer is "Always true "

Explanation:

Following are the program to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

bool x=true;//defining bool variable x and assign value

bool y=false;//defining bool variable y and assign value

if(!(x || y) || (x || y))//use given condition with if block

{

   cout<<"True";//print true message

}

else//defining else block

{

   cout<<"false";//print false message

}

   return 0;

}

In the above code two bool variable is declared, that hold ture and false, and used in the given expression with the condition statement, that checks the given value. In the code the logical gate OR gate that always print the true value.

3 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
(--BRAINLIEST--)<br>Explain the types of secondary memory on the basis of data access.​
Nina [5.8K]

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
8 0
3 years ago
Read 2 more answers
A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
frutty [35]

Answer:

Well, I would definitely advise him to buy USB hubs.

Explanation:

USB hub is a device that can give additional USB slot for the user just by consuming one single slots. In recent years, USB hubs can contain more than 9 slots with different variety, including HDMI and DVI that is required by this particular friend.

Using this device will make it easier to plug in and plug out all the devices he wants to his laptop since it all connected to one single hub.

Since he only has the budget under 100$ , Dell DA300 6-in-1 USB-C Hub could be a good option for Him.

6 0
3 years ago
Which word pairs are both principles of HCT?
Dimas [21]

Answer:

network engineering and game programming

8 0
3 years ago
Other questions:
  • I need Help Right now!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • What element is used to configure a new paragraph?
    9·1 answer
  • Linux is
    8·1 answer
  • The date your Science project is due should be recorded on a daily organizer. Please select the best answer from the choices pro
    14·2 answers
  • What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
    13·1 answer
  • My friend has a battery of 9000mah and loses 10 every day how many days well it take to go to zero
    13·1 answer
  • Solve using the standard algorithm 758 x 92
    5·1 answer
  • Which X software package is designed to be a more streamlined and easier to use replacement for the X Window System
    12·1 answer
  • How does defragmentation improve performance?
    9·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!