1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
10

What? I couldn't hear you. (play along)

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
5 0

Answer:

no

Explanation:

You might be interested in
Any file that contains data but not instructions for your computer is not considered software
DIA [1.3K]
True. 

But then again, partly false. A .deb file (Debian, Ubuntu Linux) contains data, but that data needs to be installed and marked executable to make the software.

But i would still say true.
5 0
3 years ago
Jill edited James's document using Track Changes. James agrees with all of the edits and wants to incorporate them into his text
OLga [1]
   Hey friends

The answer would be B

              ~Katie

8 0
3 years ago
Read 2 more answers
Ping pc-b from a command prompt window on pc-a. were the pings successful? why?
love history [14]
If the pings are successful you are either on the same subnet and everything is configured correctly or ICMP echo is enabled on the router which it should be by default internally. Externally, ICMP can/should be disabled to avoid DOS attacks.
7 0
3 years ago
9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a
AleksandrR [38]

Answer:

#include <iostream>

using namespace std;

int * reverse(int a[],int n)//function to reverse the array.

{

   int i;

   for(i=0;i<n/2;i++)

   {

       int temp=a[i];

       a[i]=a[n-i-1];

       a[n-i-1]=temp;

   }

   return a;//return pointer to the array.

}

int main() {

   int array[50],* arr,N;//declaring three variables.

   cin>>N;//taking input of size..

   if(N>50||N<0)//if size greater than 50 or less than 0 then terminating the program..

   return 0;

   for(int i=0;i<N;i++)

   {

       cin>>array[i];//prompting array elements..

   }

   arr=reverse(array,N);//function call.

   for(int i=0;i<N;i++)

   cout<<arr[i]<<endl;//printing reversed array..

   cout<<endl;

return 0;

}

Output:-

5

4 5 6 7 8

8

7

6

5

4

Explanation:

I have created a function reverse which reverses the array and returns pointer to an array.I have also considered edge cases where the function terminates if the value of the N(size) is greater than 50 or less than 0.

8 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Other questions:
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • You can type notes of what to cover when presenting the show in the______ pane.
    15·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
    9·2 answers
  • What are the ASE special certifications?
    14·2 answers
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Did anyone else remember that Unus Annus is gone? I started crying when I remembered.... Momento Mori my friends.... Momento Mor
    9·2 answers
  • Create the following SQL Server queries that access the Northwind database. Place them in a zip file and place the zip file in t
    6·1 answer
  • How to realize dynamic balance of planar closed-chain leg mechanism?​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!