1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
6

Consider the following program:

Computers and Technology
1 answer:
Nostrana [21]3 years ago
7 0

Answer:

this would be answer D

Explanation:

You might be interested in
An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
Ivan

Answer is A. The data has been filtered

The funnel in Excel lets you know that there is a filter in place on the columns. It is a filter icon. By default, any filtered column in Excel gets a little funnel icon on the top row as shown in the image attached. Once this funnel symbols is clicked, it gives you options to filter using several criteria.

6 0
3 years ago
PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.txt
Mrac [35]

Answer:

pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")

Explanation:

PGP encryption from the command line can be done using the following format:

  • pgp --encrypt (input) --recipient (user) --output (output file)

Therefore, PGP command line syntax to encrypt the my-message.txt file for a specific user (Sean) and save the output as secret-message.txt.gpg is:

  • pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")
6 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
2 years ago
The _____ method of developing systems produces code that is modular and reusable.
Ymorist [56]

The object-oriented analysis method of developing systems produces code that is modular and reusable.

<h3>What is object oriented system analysis?</h3>

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

brainly.com/question/11158544

#SPJ1

8 0
1 year ago
A new version of an existing software program is considered a ________technology
inn [45]
Emerging and sustaining.
8 0
3 years ago
Other questions:
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • Iven the code fragment below with nested if statements, rewrite the code to combine all the tests into one if statement with mul
    7·2 answers
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • Which segment of society introduced the grunge look?
    5·2 answers
  • a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light
    6·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    14·2 answers
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • 15
    9·2 answers
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • I will give brainyest
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!