1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
5

Ineeedd help please 35 points question

Computers and Technology
1 answer:
vesna_86 [32]3 years ago
7 0

Answer:

1

Explanation:

The four gates on the left are XNOR gates, their output is 1 if both inputs are equal. This is the case (given), so all inputs to the quadruple AND gate are 1, hence the output is also one.

You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
State the major different between fours types of computers
Igoryamba

Answer:

1. Supercomputers

Supercomputers are very expensive and very fast. They are the most powerful computers we have in the world.

Supercomputers are optimized to execute only a small number of programs. This makes it possible for them to execute these few programs at a very high speed. Due to their inhibiting cost, they are used in high-end places like in scientific research centers. The supercomputer consists of thousands of processors, allowing it to clock in at very high speeds measured by petaflops.

These computer types are also very large in size due to the numerous parts and components involved in their design.

A good example of a supercomputer is Tianhe-2, which is located in the National Supercomputer Center in Guangzhou, China. It features 3.12 million cores, allowing it to run at speeds of 33.86 petaflops.

2. Mainframe Computers

These are large and expensive computers that are capable of supporting thousands of users simultaneously. They are mostly used by governments and large organizations for bulk data processing, critical applications, and transaction processing. They are ranked below supercomputers.

3. Minicomputers

Minicomputers are mid-sized computers. In terms of size and power, they are ranked below mainframes. A minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.

The use of the term minicomputer has diminished since the introduction of microprocessors. These machines are now more commonly called midrange computers.

4. Microcomputers

A microcomputer, also known as a personal computer, is designed to be used by one user at a time. The term microcomputer relates to the microprocessor that is used for the purpose of processing data and instruction codes. These are the most common computer types since they are not very expensive

8 0
2 years ago
The concept of algorithm ____, is one in which you can observe an algorithm being executed and watch as data values are dynamica
Yakvenalex [24]
The answer to this question would be algorithm animation.

Since the algorithm is animate, then you will be able to watch it works. Watching the algorithm executed can give you much information, what the algorithm does and how the algorithm does it.
Normally you will not be able to do this since the algorithm only do what it needs to do without reporting the detail to you
4 0
3 years ago
The program requires the age to be between 0 and 8.
yaroslaw [1]

Answer:

b

Explanation:

5 0
2 years ago
Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you
Brut [27]

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

<h3>What are the benefits and drawbacks of the usage of an ATM card?</h3>

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

brainly.com/question/19185661

#SPJ1

3 0
2 years ago
Other questions:
  • Linux distributions overview? information​
    7·1 answer
  • A _____ is a predefined text format that includes multiple formatting options.
    14·1 answer
  • Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
    13·1 answer
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
    11·1 answer
  • Please help me please
    6·1 answer
  • A negative effect of computer technology's role in creating images is that:
    13·2 answers
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • What does Stand for in web design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!