1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
7

Which best explains a password attached to a document?

Computers and Technology
1 answer:
Otrada [13]3 years ago
3 0
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
You might be interested in
What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
Sloan [31]

Comprehensive or hazard insurance

5 0
3 years ago
1. Write a high level algorithm for cooking a cheeseburger.
pishuonlain [190]

Answer:

1.  A high level algorithm for cooking a cheeseburger could be:

  1. Heat fry pan
  2. Cook one side of the hamburger
  3. Wait
  4. Turn hamburger upside down
  5. Put cheese over hamburger
  6. Wait
  7. Cut hamburger bread in half
  8. Put cooked hamburger inside bread
  9. End (eat)

2. A detailed algorithm for cooking a cheeseburger could be:

  1. Place fry pan over the stove heater
  2. Turn on heater (max temp)
  3. IF fry pan not hot: wait, else continue
  4. Place raw hamburger on fry pan
  5. IF hamburger not half cooked: Wait X time then go to line 5, else continue
  6. Turn hamburger upside down
  7. Put N slices of cheese over hamburger
  8. IF hamburger not fully cooked: Wait X time then go to line 8, else continue
  9. Turn off heater
  10. Cut hamburger bread in half horizontally
  11. Put cooked hamburger on one of the bread halves.
  12. Put second bread half on top of hamburger
  13. End (eat)

Explanation:

An algorithm is simply a list of steps to perform a defined action.

On 1, we described the most relevant steps to cook a simple cheeseburger.

Then on point 2, the same steps were taken and expanded with more detailed steps and conditions required to continue executing the following steps.

In computational terms, we used pseudo-code for the algorithm, since this is a list of actions not specific to any programming language.

Also we can say this is a structured programming example due to the sequential nature of the cooking process.

7 0
3 years ago
Which of the following statements best describes IT careers?
DiKsa [7]

The answer is (C) IT careers are found in a wide variety of industries.

Nowadays, all types of industries in various different parts of the world will have an IT (information technology) department because it is needed, since most businesses operate using some form of IT equipment, which, most commonly found is a computer. It is a particularly lucrative field because of the wide array of job availability.

7 0
3 years ago
Dwayne Alexander is working on a project promoting a fictitious product for his marketing class. He wants to use animation to sh
erastova [34]

The following are examples of animation apps:

  • Toon Boom Animation (2-D)
  • Prisma3D (3-D) and
  • AnimeTok (3-D)

<h3>What are the Pros and the cons of each app listed above?</h3>

Toon Boom Animation Pros:

  • It has a great set of tools
  • It has camera angles functionality
  • Has a vector drawing tool

Cons:

  • It is expensive.

Prisma3D (3-D) Pros:

  • It is good for modeling;
  • Easy to use interface

Cons:

  • It has too many bugs.
  • lacks sculpting tools

AnimeTok (3-D) Pros:

  • It makes it easy to move the characters easily
  • It is easy to understand

Cons:

  • It has too many ads
  • does not have an undo and redo button

Learn more about Animation Apps at:
brainly.com/question/7279789

6 0
2 years ago
How much data do sensors collect?<br>​
Thepotemich [5.8K]

Safety sensors in mining operations can generate up to 2,4 terabits (TB) of data every minute. Sensors in one smart-connected home can produce as much as 1 gigabyte (GB) of information a week.

3 0
3 years ago
Read 2 more answers
Other questions:
  • ____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.
    14·1 answer
  • What is the name used for the integrated program development environment that comes with a Python installation?
    5·1 answer
  • A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
    11·2 answers
  • To move up one paragraph, press the ____ key(s). f1 alt up arrow up arrow ctrl up arrow
    8·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • The Internet acts as a(n) blank services such as The World Wide Web and email
    6·2 answers
  • Alan has introduced a new line of scooters on his website and is using a Google Display Ad campaign to promote them. He selects
    8·1 answer
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
  • What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domai
    7·2 answers
  • To behave ethically means
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!