1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
8

COMO HA SIDO LA INNOVACION DE ESTE OBJETO TECNOLOGICO DURANTE SU EVOLUCIÓN

Computers and Technology
1 answer:
Marizza181 [45]3 years ago
3 0

Answer:

Cual es el objeto tecnologico?

Explanation:

Si dices Cual,puede ser que te ayude.

You might be interested in
You are running Windows 8 on your laptop. You install a 64-bit application on it. Where will this application reside on your com
melamori03 [73]
In the Program Files folder.
6 0
3 years ago
Read 2 more answers
What does an arrow next to a menu item indicate?
katrin2010 [14]
Can you provide a screenshot maybe?
There are many menu items.

4 0
3 years ago
An organization is deploying a new system to the production environment. A security analyst discovers the system is not properly
Alisiya [41]

Answer:

The best answer is A) A secure baseline was not established early in the process.

Explanation:

If the organization is deploying to the production environment and the security analyst discovers this risk at this point, then a secure baseline was not established, because it is impossible to successfully pass the coding and peer review instances by programmers and testing instances by the QA team without any warning to correct this problem.

5 0
4 years ago
A) Describe how an attacker can obtain the one-time pad that is used to encrypt a message, given both the message and the cipher
erastovalidia [21]

Answer:

(a)

Assuming the one-time pad P is used to XOR the message M to get ciphertext C, the following holds:

M ⊕ P = C

P = C ⊕ M

this is a basic property of how XOR works.

(b)

P = M1 ⊕ C1

then M2 = C2 ⊕ P

(c)

The attacker can make assumptions about the message (e.g., presence of certain words and spaces) and then calculate which pad would be needed to get them in the ciphertexts. He then has two ciphertexts that should yield valid content, making it much more easy to guess the pad.

Explanation:

5 0
3 years ago
What type of file system is used by blu-ray discs?
soldi70 [24.7K]

Answer:

Universal disc format (UDF) file system.

Explanation:

Blue-ray discs are the optical disc for data storage in a digital format. They were designed as succession of DVDs. They use UDF file system in them.

  • UDF file system is used in blu-ray discs.
  • This system is used to store data on discs by burning media.
  • These files have the extension (.UDF)
  • UDF is mostly used in DVDs and optical discs.
  • Broad range of data is stored in computer storage using UDF.
8 0
3 years ago
Other questions:
  • Video-sharing sites allow videos to be uploaded in which file format? A. .avi B. .svg C. .tiff D. .xls
    5·1 answer
  • Which function should be used to display a value based on a comparison?
    11·1 answer
  • External hard disks use different technology than internal hard disks. ture or false
    6·1 answer
  • How can an installation be a tool for community building?
    9·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • A technician attempts to run an executable file on a Linux computer but receives a Permission Denied message.
    11·1 answer
  • A macro enables you to automate repetitive tasks by
    5·1 answer
  • PLEASE CLICK THIS VIRUS LINK
    7·1 answer
  • Place Letter or word in correct section where it says labels bellow
    14·2 answers
  • Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!