1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
8

Cryptography has requirements include:

Computers and Technology
1 answer:
Nastasia [14]3 years ago
5 0

Answer:A i think

Explanation:

You might be interested in
When one method calls another, which of the following statements are true?
jonny [76]

Answer:

I. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

Explanation:

Private methods are being accessed from only within the class or scope specified. No other means of accessibility is possible, and even through inheritance. And instance methods can never call without using dot notation, any of the class method of the same class. Hence second and third options are not correct. And the class method and the instance methods of one class may call the public class methods of another class using the dot notation and referencing the name of the other class. Hence, the correct option is the first one.

3 0
3 years ago
You administer a Microsoft SQL Server environment. You purchase a new server and plan to migrate your database from SQL Server 2
Snezhnost [94]

Answer:

B. Migration Assistant

Explanation:

Migration assistant also referred to as the Data Migration Assistant (DMA) is a Microsoft tool used during SQL server upgrades to detect any compatibility issues that could impact the functionality of the new version of SQL server being installed. The Data Migration Assistant will also recommend performance and reliability improvements as well as allow you to move your SQL server data and schema from the source server to the destination server.

8 0
3 years ago
Choose the types of education and iss professional is most likely to have
shutvik [7]

Answer:

A and D

Explanation:

Just took it on edgenuity

8 0
3 years ago
Complete the program below that takes in one positive, odd, integer, n (at least 3), and prints a "diamond" shape of stars with
avanturin [10]

Answer:

n = int(input("Enter the n (positive odd integer): "))

for i in range(1, n+1, 2):

   print(i*"*")

for i in range(n-2, 0, -2):

   print(i*"*")

Explanation:

*The code is in Python.

Ask the user to enter the n

Create a for loop that iterates from 1 to n, incrementing by 2 in each iteration. Print the corresponding number of asterisks in each iteration

Create another for loop that iterates from n-2 to 1, decrementing by 2 in each iteration. Print the corresponding number of asterisks in each iteration

5 0
3 years ago
Some program menus are the same in every program you open. Under the File menu, all of the following are the same in every progr
irina [24]

<u>Answer</u>

The correct answer is Merge.

<u>Explanation</u>

We know that,Some program menus like file, view, edit etc, are the same in every program you open.  

Under the File menu,there are Save, Save as,Open,Print, share etc  

But there is no merge under file menu.

Therefore the correct answer is Merge

The merge option is different for different application like MS word, Excel etc

3 0
3 years ago
Other questions:
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • Will somebody help me???? ANYBODY?? PLZZZZZZZZZZZZ
    8·1 answer
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • Any parameter that receives a value and also sends a value outside the function must be declared as a reference parameter.
    8·1 answer
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • The first query is computationally less expensive than the second query. (Assume no indexes exist on release_date.) Query 1: SEL
    11·1 answer
  • HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HEL
    15·2 answers
  • (a) List 5 keys we can type with our left hand fingers
    9·1 answer
  • The ______ Works on a single variable or constant. *​
    8·1 answer
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!