1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
11

U

Computers and Technology
1 answer:
JulijaS [17]3 years ago
6 0

Answer:

sgvxvb

Explanation:

cbcbcbcb

You might be interested in
Provide an example of a question that could NOT be answered with a binary message. Explain why this is the case, making referenc
solong [7]
This is a question with a much simpler answer given its open ended ness - a representation merely means, given binary data, we can determine what 'thing' that binary data corresponds to.

<span>That makes the question unanswerable, because words can all be represented in binary data, and the question cannot be answered without those. Thus, all answers we can convey have a binary representation of some form (that form being the translation of the words we used to communicate the answer into binary data).</span>
7 0
4 years ago
I need like 10 sentences to delineate and discuss societal issues related to computing . “Including the guiding principles of pr
beks73 [17]

Answer:

Kindly check Explanation

Explanation:

Advancement in technology spurred largely due to the advent of the computer and internet has resulted in a notable change in the behavior, lifestyle and engagement of many individuals. This include ; providing a faster and more convenient way of computing and completing tasks. Accelerating the global rate of technological development due to great computing capabilities. Educational enhancement and development through online education.

Computing also pose some societal issues which needs to addressed. This include :

Issues regarding privacy and identity theft are widespread. Addiction to games and other engaging content often pose distraction to youth and child development. Computing could be said to have placed increased pressure on human power and engagement with the advent of automated robots and programs. Increased exposure to electromagnetic rays. Promotion of indecency and immoral contents has become increasingly easier. Peer influence through fake promotion and display of wealth by some overrated individuals.

Therefore, it is imperative that informations conveyed through the internet are treated with utmost confidentiality in other to avoid privacy issues which may arise from leakage.

8 0
4 years ago
Suppose that a queue is implemented using a circular array of size 12. What is the value of last after the following operations?
otez555 [7]

Answer:

10

Explanation:

An enqueue operation is a function that adds an element(value) to a queue array. A dequeue operations removes an element from a queue array. Queue arrays follow a first-in-first-out approach, so elements that are first stored in the queue are removed/accessed first(enqueue operations add elements at the rear of the queue array).

The following operations leave 10 elements in the queue of array size 12 after its done:

10 enqueue operations= adds 10 elements

5 dequeue operations= removes 5 elements( 5 elements left in queue)

6 enqueue operations= adds 6 elements(11 elements in queue)

10 dequeue operations= removes 10 elements(1 element left in queue)

8 enqueue operations= adds 8 elements(9 elements in queue)

2 dequeue operations= removes 2 elements(7 elements left in queue)

3 enqueue operations= adds 3 elements(10 elements in queue)

Therefore there are 10 elements in the queue after enqueue and dequeue operations.

8 0
3 years ago
A) Describe how an attacker can obtain the one-time pad that is used to encrypt a message, given both the message and the cipher
erastovalidia [21]

Answer:

(a)

Assuming the one-time pad P is used to XOR the message M to get ciphertext C, the following holds:

M ⊕ P = C

P = C ⊕ M

this is a basic property of how XOR works.

(b)

P = M1 ⊕ C1

then M2 = C2 ⊕ P

(c)

The attacker can make assumptions about the message (e.g., presence of certain words and spaces) and then calculate which pad would be needed to get them in the ciphertexts. He then has two ciphertexts that should yield valid content, making it much more easy to guess the pad.

Explanation:

5 0
3 years ago
True / False<br> An instruction’s opcode generally indicates the number and type of its operands.
liq [111]

Answer:

True

Explanation:

An opcode is the part of instruction which specifies the operation to be performed by the instruction.

In general, the opcode also provides information about the number and type of operands.

For example, let us consider the MIPS instructions for addition.

  • ADD reg_dest, reg_src1, reg_src2

This instruction adds the contents of registers reg_src1 and reg_src2 and stores the result in reg_dest.

  • Whereas, ADDI reg_src, reg_dest, value

This instruction adds the value to the content of reg_src and stores the result in reg_dest.

As we can see the opcode type indicates the operand type, number and semantics.

7 0
3 years ago
Other questions:
  • You should type------ space(s) after a period at the end of a sentence.
    13·2 answers
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • Write a program to read customer number, Name, loan amount, interest rate and time of repayment. Calculate and display the EMI .
    9·1 answer
  • A systems analyst draws a lifeline with an X at the end. This lifeline represents _____.a. a message that cannot be deliveredb.
    9·2 answers
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • Which would be included in a SaaS platform?<br><br> A.data link<br> B.IaaS<br> C.Java<br> D.vb.net
    5·1 answer
  • C. An error that due to wrong input.​
    13·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • Rom a game design perspective, including some risks in your game can help make it both exciting and challenging, but also what e
    15·1 answer
  • How to fix this? Zoom it in to see it better
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!