1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
4 years ago
10

Programmers often author which type of information to guide test runs?

Computers and Technology
1 answer:
Bumek [7]4 years ago
8 0
Hey there!

I think the answer would be A. reports. I’m not sure but

Hope this helps !
You might be interested in
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
Len [333]

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

4 0
3 years ago
Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practic
nikdorinn [45]

Answer:

Answer explained below

Explanation:

Given: The information provided is given as follows:

  • There is a small veterinary practice which includes the services like office visits, surgery, hospitalization and boarding.
  • The clinic only has a small LAN, four computers and internet access.
  • The clinic only accepts cats and dogs.
  • Hurricanes are the major threatening factor in the geographical region where the clinic is located.
  • The clinic is established in a one-story building with no windows and meet all the codes related to hurricanes.
  • As public shelters do not allow animals to stay when there is a possibility of hurricanes, therefore the clinic does not accept animals for boarding during that time

Contingency planning documents for the tasks given is as follows:

  1. Threat category along with their business impact:
  • Hurricane: It is given that the region where the clinic is located is highly threatened by hurricanes. This type of disaster can affect the life of the employees as well as patients present in the building. Also, in case of a strong hurricane, the building can also be damaged.
  • Preventive measures: Separate shelters can be installed for animals in case of emergency.

  • Fire: In case of fire due to malfunctioning of any electrical equipment or any other reason, there is no window or emergency exit available. It can damage the building and the life of the employees and animals will be in danger.
  • Preventive measures: Services should be provided to all the electrical equipment’s from time to time and emergency exits should be constructed so that there is a way to get out of the building in case the main entrance is blocked due to any reason in the time of emergency.

  • Viral Influenza: If an employee or animal is suffering from any serious viral disease. That viral infection can easily spread to others and make other animals as well as employees sick. If the employees working in the clinic are sick. This will highly affect the efficiency of them which will then affect the business.
  • Preventive measures: This can be avoided by giving necessary vaccines to the employees from time to time and taking care of the hygiene of the patient as well as the clinic which will make the chance of infection to spread low.

  • Flood: In case of a flood like situation, as given the building has only one story and there is no emergency exit for employees and animals to escape. This can put the life of the employees and animals in danger and can affect the working of the clinic as well.
  • Preventive measures: This can be prevented by collecting funds and increasing the story’s in the building or constructing alternate site location so that in case of emergency, the animals or employees can be shifted to other locations.
4 0
4 years ago
Which statement about the subject line is true? The subject line can be found just below the message box. The subject line is ma
charle [14.2K]
Filling in the subject line is optional, but it is a good practice.
5 0
4 years ago
Read 2 more answers
Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?
mamaluj [8]
<span>Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?
Ryze
Friendster
SixDegrees
Tribe.net
MySpace


The Correct answer is </span>Friendster.
5 0
4 years ago
What is the default letter assigned for the primary hard drive?
SVETLANKA909090 [29]

d drive i think unless ssd

8 0
3 years ago
Other questions:
  • Just giving this a shot, Which of the following statements about RAM are TRUE? Select all that apply.
    10·1 answer
  • Which of the following can be both an input device and an output device? mouse. keyboard. display screen. laser printer .
    9·1 answer
  • give 2 reasons why u think that technology will be bigger in the future and why do we need it not for school need your perspecti
    12·2 answers
  • Which carrier sense technology is used on wireless networks to reduce collisions?
    7·1 answer
  • When you leave your computer for a short period of time, why should you put your computer into Standby mode?
    5·2 answers
  • Design the program that reads two files and compares their contents. The program calls a method that reads the file one line at
    10·1 answer
  • What is a back door?
    12·2 answers
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • Dawn is trying to find out how much weight she can push across the room. She is really trying to find her __________. A. flexibi
    11·1 answer
  • Which coding manual contains three to seven character codes with a decimal after the third character
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!