1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
14

Which of the following pathways is related to Agriculture, Food, and Natural Resources?

Computers and Technology
1 answer:
Elis [28]3 years ago
3 0

C. Environmental Service Systems

You might be interested in
80. A .......... is used to read or write data.<br>A. CD B. VDU C. ROM D. RAM​
Volgvan

Answer:

Depending on exactly what they mean by read and write, both A and D are valid.  In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.

What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.

A.  Data can be written to or read from a CD.  This is probably the "right" answer

B. A human can "read" data from a Visual Display Unit, and the computer "write" it.  That of course is not the intended meaning though.

C.  Data can be read from Read Only Memory, but not written to.

D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.

8 0
3 years ago
Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
Alenkasestr [34]

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

6 0
3 years ago
Read 2 more answers
Why do computers use binary code?
Anna71 [15]

Answer:

To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand

4 0
3 years ago
Read 2 more answers
Which of the following applications can be used as a data source for a Microsoft® Word® mail merge? A.Outlook Contacts B.Microso
Xelga [282]
<span>Word can pull data from a variety of data sources to perform a mail merge. As part of the Microsoft Office suite, Word easily accepts data from Outlook, Excel, and Access, and other data sources such as web pages, OpenDocument text files, and delimited data files stored as plain text. And if you don't have an existing data source, you can create a new one in Word.
ALL OF THE ABOVE

</span>
8 0
3 years ago
Read 2 more answers
What would be the best thing you could do to prepare yourself to work for a company that has embraced globalization. A) learn ho
laila [671]

Answer:B

Explanation: your co workers might not know English so you would need to learn their language :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • Solve system of equations. <br>x+2y-z=4<br>2x-y+3z=8 <br>-2x+3y-2z=10
    12·1 answer
  • Which is the last step in conducting a url research
    11·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • According to COSO, which of the following components addresses the need to respond in an organized manner to significant changes
    14·1 answer
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • What is TCP/IP adress​
    10·1 answer
  • Implement a program that manages shapes. Implement a class named Shape with a method area() which returns the double value 0.0.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!