1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
12

Select the correct answer.

Computers and Technology
2 answers:
Vladimir79 [104]3 years ago
4 0

Answer:

I think make a copy maybe

Explanation:

cricket20 [7]3 years ago
3 0

Answer:

D

Explanation:

She can save and store the doc, change the name when saving, and make changes to revise once saved.

You might be interested in
The ____ provides access to the Internet may also be internal.
dmitriy555 [2]
Local area network (LAN)
7 0
3 years ago
Read 2 more answers
The first computer program was used to help the analytical engine calculate numbers. Who invented that program?
nikdorinn [45]

Answer:

Charles Babbage

Explanation:

Analytical engines were presumed to be the first general-purpose computer which was designed sometime in the 19th century by Charles Babbage -  a British mathematician and inventor. A series of punch cards was used by Charles Babbage in his design of the engine. These punch cards were used for various operations such as arithmetical operations, numerical constants and other operations such as load and store.

<em>Hope this works!</em>

8 0
3 years ago
A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
Alexxx [7]

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

7 0
3 years ago
[True/False] Mainframes, unlike microcomputers, allow users unlimited and flexible access to computing power.
Lemur [1.5K]

Answer:

The given statement is "False".

Explanation:

Mainframes computer are also known big iron computer basically Mainframe computer is used by the big organization when the organization needs to work in the high-level project. The mainframe has big data processing. It is highly used in critical applications such as ERP(Enterprise resource planning).

A mainframe computer is not a flexible computer also they are not potable .microcomputers, are more flexible computers we can easily work on the microcomputers.

So the given statement is False.

8 0
3 years ago
9. Question
Gennadij [26K]
A server stopped provide service to 100 users
5 0
3 years ago
Other questions:
  • What is the difference between deta security and privecy ?
    12·2 answers
  • Online library catalogs can direct you to your closest library. (1 point)<br> True<br> False
    8·1 answer
  • Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two
    11·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
    10·1 answer
  • Name 3 examples of operating system software that are not Windows based.
    5·1 answer
  • Consider the following threats to Web security, and describe how each is countered by a particular feature of SSL.
    15·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • Write the name of main ore of silver.Write any two application of sliver​
    14·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!