1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
9

Explain an application software​

Computers and Technology
1 answer:
dedylja [7]3 years ago
6 0

Answer:

application software refers to the programs or series of instructions that allows us to do specific type of task on a personal computer examples word processing programs, spreadsheet programs, presentation programs among others

You might be interested in
What is a shot sequence
Elan Coil [88]
A shot sequence is the time between when a shot is shot and when it lands
7 0
4 years ago
the history of forensics webquest answer key pdf what did the following people contribute to forensics
Tatiana [17]

A person that is known to have contribute to Forensics is Mathieu Orfila

<h3>Who is known as the father of forensic toxicology and why?</h3>

Mathieu orfila is said to be called  the father of toxicology due to the fact that he was the onw who was known to have published his work as the first scientific treatise on the act of knowing of poisons and as well as their effects on animals.

He is known to have done the work that set up forensic toxicology as a legitimate scientific discipline.

Hence, A person that is known to have contribute to Forensics is Mathieu Orfila

Learn more about Mathieu Orfila from

brainly.com/question/21073600

#SPJ1

3 0
2 years ago
Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
pychu [463]

Answer:

Option (B) i.e., character is the correct answer to the following question.

Explanation:

Because the character quality demonstrates the ability of honesty, loyalty, and integrity, etc that shows the positive character of the person and Greg has good character quality because he thinks about their customers before he thinks about the money. So, that's why Greg shows the quality of the good character and he also loyal about their work.

8 0
3 years ago
Write a regular expression pattern that matches strings representing trains. A single letter stands for each kind of car in a tr
MAVERICK [17]

Answer:

See explaination

Explanation:

import re

def isValidTrain(train):

pattern = r'^E+(((P|PP|PPP|PPPP)D)*(BB)*)*C$'

if re.match(pattern, train):

return True

return False

def checkAndPrintTrain(train):

print("Train", train, "is valid:", isValidTrain(train))

checkAndPrintTrain("EC")

checkAndPrintTrain("EEEPPDBBPDBBBBC")

checkAndPrintTrain("EEBB")

checkAndPrintTrain("EBBBC")

checkAndPrintTrain("EEPPPPPPDBBC")

checkAndPrintTrain("EEPPBBC")

checkAndPrintTrain("EEBBDC")

Sample output

Train EC is valid: True

Train EEEPPDBBPDBBBBC is valid: True

Train EEBB is valid: False

Train EBBBC is valid: False

Train EEPPPPPPDBBC is valid: False

Train EEPPBBC is valid: False

Train EEBBDC is valid: False

6 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Other questions:
  • Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
    5·1 answer
  • Write three tasks students can preform in a digital classroom?
    9·2 answers
  • Consider the following 32 bit binary representation of the value using IEEE 754 single precision floating point representation.
    15·1 answer
  • Which number is equivalent to 3e-2?<br> 3<br> 0.3<br> O 30<br> my<br> 0.03
    8·1 answer
  • If a fuse block or holder has tree fuses, it may be termed a...
    7·1 answer
  • Could you please check my answers to this layout user defined data types
    15·1 answer
  • A or an is a simple chip with two or more processor core
    5·1 answer
  • 50 POINTS
    6·1 answer
  • Well I ended up figuring it out
    7·1 answer
  • Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the tech
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!