1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
7

HELP!!!!!

Computers and Technology
1 answer:
xxMikexx [17]3 years ago
5 0
Leave the room and let someone else figure it out!
You might be interested in
Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
Mashcka [7]

Answer: Switch

Explanation:

 The switch is the device that is basically use for the connection for separate segment that basically appear in the similar segment in the computer network.

Switch is the ethernet that is based on the  LAN peruses approaching TCP/IP information packets containing goal data as they go into at least one info ports. The goal data in the bundles is utilized to figure out which yield ports that will be utilized to sending the information on to its proposed goal.

Therefore, Switch is the correct options.

 

4 0
4 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
How do you add text in Photoshop CC?​
Schach [20]

Explanation:

First select the Type Tool from the Toolbar

Click in the document to view the live preview.

Choose a new font.

Choose a type size.

Add your text.

5 0
3 years ago
When using the wait and signal operations, ____ sets the process's process control block to the blocked state and links it to th
lbvjy [14]
<span>When using the wait and signal operations, Wait sets the process's process control block to the blocked state and links it to the queue of processes waiting to enter this particular critical region.</span>
3 0
3 years ago
Other questions:
  • 1. How do you answer questions that require you to draw inferences? (1 point)
    7·2 answers
  • Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
    14·1 answer
  • Meadowdale Dairy Farm sells organic brown eggs to local customers. It charges $3.25 for a dozen eggs, or 45 cents for individual
    6·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • In order to access the internet, it is not necessary to have an internet service provider (isp).true or false
    5·2 answers
  • A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
    12·1 answer
  • Write a program that uses a loop to read 10 integers from the user. Each integer will be in the range from -100 to 100. After al
    10·1 answer
  • Select the correct answer
    5·2 answers
  • After several rounds of sessions and reviews, you finally have a list of confirmed requirements from a client in the music indus
    8·1 answer
  • PLS HELP I GOT 30 MINS TO TURN THIS IN!!!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!