1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
8

What are the possible consequences of invasion of privacy?

Computers and Technology
1 answer:
Sergio039 [100]3 years ago
7 0
Jail time since you can be considered a spy or a perv. Whatever you aim is of course.
You might be interested in
Suppose h(m) is a collision-resistant hash function that maps a message of arbitrary bit length into an n-bit hash value. is it
Korolek [52]

That can't be true. Collision resistant just means the chance is really low, but not 0. Suppose you enumerate all possible hash values with each their different original message. Since the message length can be larger than n, you can then find a message whose hash is already in the list, ie., a collision!

5 0
3 years ago
Pseudocode of creating a program to convert to IEEE 754 to a real number
Eduardwww [97]

Answer:

  • Step1: Check If the number is Positive or Negative.  
  • Step2: If it is positive then save the sign of it as 0.  
  • Step3: If it is negative then save the sign of it as 1.
  • Step4: Covert the negative number to Positive.
  • Step5: Convert the IEEE 754 to Binary.
  • Step6: convert the integer part into binary form  
  • Step7: Convert fractional part into binary form
  • Step8: To convert Integer part, Devide the number by 2 and note down the reminder and Keep deviding unless dividend is less than 2
  • Step9: copy all the reminders together
  • Step10: Multiply decimal part by 2 unless fractional part is 0.
  • Step11: By noting down integral part, keep multiplying decimal part by new value of 2 untill perfect number is reached.
  • Step6: Find the Mantissa.
  • Step7: Concatinate the Sign, exponent and the mantissa.

Explanation:

For Example : 20.75

First step (converting 50 (in base 10) to binary):

  • No is Positive
  • By dividing 20 by 2, which gives 10 with no remainder 0.
  • Now Devide 10 by 2, which gives 5 with a remainder of 0.
  • Now Devide 5 by 2, which gives 2 the reminder as 1
  • Now Devide 2 by 2, which gives 1 with reminder as 0
  • Now devide 1 by 2, which gives 0 with reminder as 1
  • We read the result from bottom to top  which is 10100

Second part is to convert 0.75 to binary:

  • We have to multiply 0.75 by 2, which gives 1.5. We keep only the integer part, which is 1.  
  • Now, we do 1.5 - 1, which gives 0.5. Now, We multiply 0.5 by 2, which gives 1.  
  • Now we do 1 - 1, which gives 0.
  • Reading from Top to bottom will give 110

Final Answer is : 10100.110

8 0
3 years ago
All digital images are made up from varying rectangles of color, called _____________.
Dmitry_Shevchenko [17]
<span>A Pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.</span>
4 0
3 years ago
Read 2 more answers
Tiền tệ ra đời là kết quả
andrezito [222]

bruuh, wht is this man saying

7 0
3 years ago
Read 2 more answers
Whales thrive in the benthic zone because it is full of plankton.<br> Is it true or false
lorasvet [3.4K]

Answer:

true

Explanation:

4 0
3 years ago
Other questions:
  • to create a cover letter to send to a potential employers along with a resume what software program should you use
    10·1 answer
  • You are starting a spreadsheet, and you would like 500 to appear in cell C3. You should _____.
    11·2 answers
  • &gt;&gt;&gt; import math &gt;&gt;&gt; print(math.Pi) 3.141592653589793 &gt;&gt;&gt; def print_volume(): print ("What is the radi
    12·1 answer
  • Which statement below is not true of EFS
    7·2 answers
  • Select the correct answer.
    13·1 answer
  • 1. Landscapes are the one type of photograph in which you should always use the traditional perspective.
    15·2 answers
  • ___________is a standard for exchanging structured data over the web. It allows creating documents consisting of customized tags
    11·1 answer
  • What are the examples of debugging?​
    14·1 answer
  • This is really dumb but can someone help me find these memes? I can’t remember what they’re called but I remember how they went
    14·2 answers
  • What component of a change management program includes final testing that the software functions properly
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!