1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
4 years ago
7

During the revision phase, it is a good idea to

Computers and Technology
2 answers:
aksik [14]4 years ago
6 0
I took this quiz and got A right.
Hop helps even though i'm kinda late.

BlackZzzverrR [31]4 years ago
6 0

Answer:

its A

Explanation:

You might be interested in
6.
HACTEHA [7]
Question 6 west Germany  
3 0
3 years ago
You need to have a password with 5 letters followed by 4 even digits between 0 and 9, inclusive. if the characters and digits ca
aleksandr82 [10.1K]
We all know that there are 26 letters available in the alphabet and there are just 5 even numbers between 0 and 9. We are now given the situation of how many passwords can we make out of the criteria of having 5 letters that cannot be repeated and 4 even digits from 0-9. We cannot repeat the numbers and letters, thus our password will look something like this, LLLLLNNNN, where L is a letter and N is a number. Let us note that  we cannot use the characters and digits more than once.This is how we will solve the probable number of passwords.

26 x 25 x 24 x 23 x 22 x 5 x 4 x 3 x 2

When we compute this formula, we will have the total number of possible passwords:

947,232,000.00

There are 947,232,000 possible passwords based on the given criteria.
8 0
3 years ago
Davos has been reading about encryption recently. He begins to wonder how anything can be secure if everyone is using the same s
vazorg [7]

Answer:

The correct answer is B. Cipher.

Explanation:

Cipher is a system of reversible transformations that depends on some secret parameter, called key, and is designed to ensure the secrecy of transmitted information.

The cipher can be a combination of conventional characters or an algorithm for converting ordinary numbers and letters. The process of making a message secret with a cipher is called encryption. An important parameter of any cipher is the key - a parameter of the cryptographic algorithm, which ensures the selection of one transformation from the set of transformations possible for this algorithm. In modern cryptography, it is assumed that all the secrecy of a cryptographic algorithm is concentrated in the key.

7 0
3 years ago
Write a C program that gets 4 integer values from the user, namely, x1, x2, y1, and y2, and then calculates and returns the dist
lidiya [134]

Answer:

#include <stdio.h>

#include <math.h>

int main(){

   float x1,x2,y1,y2,distance;

   printf("x1: ");    scanf("%f", &x1);

   printf("y1: ");    scanf("%f", &y1);

   printf("x2: ");    scanf("%f", &x2);

   printf("y2: ");    scanf("%f", &y2);

   distance = sqrt((x1 - x2)*(x1 - x2) + (y1 - y2)*(y1 - y2));

   printf("Distance: %f", distance);

   return 0;

}

Explanation:

This line declares all required variable (i.e. the coordinates and the distance)

   float x1,x2,y1,y2,distance;

The next four line prompt and get input for the coordinates

<em>    printf("x1: ");    scanf("%f", &x1);</em>

<em>    printf("y1: ");    scanf("%f", &y1);</em>

<em>    printf("x2: ");    scanf("%f", &x2);</em>

<em>    printf("y2: ");    scanf("%f", &y2);</em>

This calculates the distance

   distance = sqrt((x1 - x2)*(x1 - x2) + (y1 - y2)*(y1 - y2));

This prints the calculated distance

   printf("Distance: %f", distance);

<em>See attachment for sample runs</em>

4 0
3 years ago
Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter code
givi [52]

Answer:

if (annualCost[0] < annualCost[1])

{

best2 = healthOption[0];

}

else

{best2 = healthOption[1];

}

Explanation:

The required code is given above.

4 0
3 years ago
Other questions:
  • Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom
    14·1 answer
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • Allow the user to enter a series of temperatures in degrees Celsius (C) ter-
    11·1 answer
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • Animation includes special visual and sound effects applied to text or other content. true or false.
    14·1 answer
  • What are some disadvantages of using a word processor over a type writer?​
    7·1 answer
  • modified true or false analyze each statement then write technical the statement is true the statement is false underline the wo
    6·1 answer
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • 2) List three (3) negative impact of Technology on society
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!