1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
8

Cryptography has requirements include:

Computers and Technology
1 answer:
Nastasia [14]3 years ago
5 0

Answer:A i think

Explanation:

You might be interested in
Computing hardware, computers using vacuum tubes were called the first generation; transistors and diodes, the second; integrate
boyakko [2]
I think this is true but like think about the computer hardware and stuff
8 0
2 years ago
In command prompt, Whats a command that will list only .ini files in C:\Windows\System32 directory?
Ber [7]

Answer:

The dir command is a Command Prompt command that's used to display a list of the files and subfolders contained in a folder.

hope it helps

3 0
3 years ago
Read 2 more answers
All of the following are tips for a great presentation except
Burka [1]

Answer: B. Use a variety of animations on most slides to keep your audiences attention.

Explanation:

While animations can serve as a tool to make your presentation more engaging, too many of them can end up being a distraction and can end up potentially frustrating the audience.

5 0
3 years ago
Read 2 more answers
Part 3:<br> Please answer
Levart [38]

Answer:

a) 4 processes

b) 2 resources

c) R1: 2 instances

   R2: 2 instances

d) R2

e) R1

f) R1

g) No resource

h)  R1

i) R2

j) R2

k) No

l)No deadlock

Explanation:

You need to know that the resources that are required by the processes for completion are shown by the request edge and the resources allocated are shown by the allocation edge. And thus, we can find what resources are allocated to the process, and required for the completion accordingly. And here again, the cycle is created, and hence deadlock may or may not occur. However, we see that resources have multiple instances and get freed on time. And hence, deadlock does not occur.

Like,

P4 uses R2 and free one instance of R2.

P3 then uses one instance of R2 and free R2.

P3 then uses one instance of R3 and free R3.

P1 uses one instance of R1 and free R1 one instance

P1 then uses R2 and free R2.

P2 uses R1 and free R1.

Hence, all the processes are complete and deadlock does not occur.

3 0
3 years ago
A tape dispenser example which simple machine
nirvana33 [79]
Your question makes no sense. Please retype it.
8 0
2 years ago
Other questions:
  • Any file that contains data but not instructions for your computer is not considered software
    7·1 answer
  • For this assignment: Analyze and describe the network infrastructure. Describe and explain the various policies that will be nee
    11·1 answer
  • Select the recommended design practice that applies to a web site using images for main site navigation.
    7·1 answer
  • "the master boot record (mbr) method of partitioning hard drives is limited to what maximum size of drives
    13·1 answer
  • Which installation changes from the old information system to the new one incrementally, starting with one or a few functional c
    14·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • Walt has selected data in a worksheet and inserted a chart. However, the chart is inserted right on top of the data set, and he
    14·2 answers
  • Menus are attached to the windows by calling
    15·1 answer
  • What is this?
    15·2 answers
  • How do I indent the 1. bullet so it is not lined up with the regular bullet above it?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!