1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
5

Complete assignment using Microsoft word

Computers and Technology
1 answer:
omeli [17]3 years ago
3 0

Answer:

Microsoft word?!?!....

You might be interested in
How do you strike through text in excel?
Valentin [98]
In the font options there is a checkbox for strikethrough. Same dialog as word, only there is no button in the ribbon for it. You could customize that by creating a custom group if you want to.
6 0
4 years ago
1. (A+B)(B'+C)(C+A)<br> 2. A'B'C'<br> 3. (X+Y)(X'+Z)(Y+Z)<br> 4. A'B'C'+A'BC'+A'BC+ABC'
Diano4ka-milaya [45]

you need to put your question

5 0
3 years ago
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter. Ex: sortArray = {10,
ludmilkaskok [199]

Answer:

Replace /* Your solution goes here*/ with the following

<em>void SwapArrayEnds(int sortArray [], int lent){ </em>

<em>    int temp = sortArray[0]; </em>

<em>    sortArray[0] = sortArray[lent-1]; </em>

<em>    sortArray[lent-1] = temp; </em>

<em>} </em>

<em />

Explanation:

This defines the function SwapArrayEnds with two parameter (the array and the array length)

<em>void SwapArrayEnds(int sortArray [], int lent){ </em>

This declares an integer variable "temp" and initializes it with the first element of the array

<em>    int temp = sortArray[0]; </em>

The next two lines swap the last element with the first

<em>    sortArray[0] = sortArray[lent-1]; </em>

<em>    sortArray[lent-1] = temp; </em>

<em>} </em>

<em />

<em>See attachment for full program</em>

Download cpp
3 0
3 years ago
It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be
olasank [31]

Answer:

a. True

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be subjected to frequency analysis.

The Playfair Cipher is generally considered to be the best multiple letter encryption cipher because it processes digrams in the plaintext as singular units and translates them directly into ciphertext digrams.

In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.

5 0
3 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • According to Porter’s five-forces model, the more the forces combine in any instance, the less likely firms will seek competitiv
    8·1 answer
  • What is the new file system available in windows server 2012?
    9·1 answer
  • Pros and cons of toyota's organizational structure?
    6·1 answer
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • The filter feature in excel allows you to look at what Data?
    7·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use i
    15·1 answer
  • Why wouldn't a game using just run-length encodings be challenging?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!