1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
3 years ago
15

Anyone down to play gta later i play on ps4?

Computers and Technology
2 answers:
Dafna11 [192]3 years ago
6 0

Answer:

Only if ur down to play fall guys...

Explanation:

pashok25 [27]3 years ago
4 0

Answer:

ok

Explanation:

user daboi1001001

You might be interested in
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
A person with no postsecondary education is most likely qualified for a career as?
Schach [20]

Answer:

Municipal Clerk

Explanation:

3 0
3 years ago
What type of microsoft server serves as an email server?
kari74 [83]
The serverof outlook
5 0
4 years ago
6. While using the HTS, ________________ will help maintain a safe driving environment despite high speeds and a large number of
levacccp [35]
It would be C, because the other ones would be breaking the law. using the horn over and over again is annoying. cell phone is distracted driving. driving slow than the speeding limit is against the law. so the only good choice is C because following the laws will not get you in trouble.
7 0
3 years ago
You've received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bi
Ad libitum [116K]

Assuming they all use the same basic algorithm, what might it be SHA-1.

c. SHA-1

<u>Explanation:</u>

As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods

MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature

SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.

3 0
3 years ago
Other questions:
  • Which of the following might be ways to reduce cognitive overload? Select all that apply
    5·1 answer
  • QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
    9·1 answer
  • What is a sluggish beta signal detection theory?
    15·1 answer
  • The appropriate length for an e-mail is about half the amount of text that will fit on an 8 1/2' by 11' page.
    11·2 answers
  • How can you tell if a motherboard can be watercooled?
    13·1 answer
  • What does prioritization help you to do?
    12·2 answers
  • Who could be involved in the murder of Mr Douglas​
    6·2 answers
  • 5. When resizing an object with the Select Tool, what keyboard key should you press to make it resize equally in all directions?
    11·1 answer
  • In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
    15·1 answer
  • Which type of work would be a good candidate for improvement through automation?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!