1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
12

Is brainly allowed because you don't Really learn from this..?

Computers and Technology
2 answers:
aleksklad [387]3 years ago
7 0

Explanation:

I don't know it's some time good and some times bad

Rudiy273 years ago
3 0

Answer:

i bet ur like that one kid who tells the teacher that she forgot to collect the homework even tho u aint even do it

True or False

Explanation:

You might be interested in
Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Inf
xeze [42]

Answer:

B, D, C

Explanation:

got it right

3 0
3 years ago
Working with text in presentation programs is similar to using text in other applications. True False
Yuliya22 [10]
I would say true because text is really important so you eant to make it look as good as possible.
8 0
3 years ago
Anthony is deciding between different savings accounts at his bank. He has four options, based on how frequently interest compou
leonid [27]
Depends is the answer multiple choice
7 0
4 years ago
Read 2 more answers
Cable television, as well as some networks, uses ________ cable.
guajiro [1.7K]
The answer is Coaxial Cable
7 0
3 years ago
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
3 years ago
Other questions:
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    6·1 answer
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • IS ANYONE ELSE JUST GETTING PPL PUTTING LINKS WHEN U ASK A QUESTION???
    12·2 answers
  • Which of these allows the programmer to put data inside a variable?
    5·1 answer
  • Write a method that makes the input string of sentences ending with and
    11·1 answer
  • You can open a movie maker project file any time in a media player. (1 point) true false
    6·1 answer
  • Lance is at a bus station. his friend is using the atm machine to withdraw some money. lance notices a stranger deceptively watc
    8·2 answers
  • Data elements in a relational database are organized into ____
    15·1 answer
  • You want to set the sticky bit on an existing directory, subdir, without otherwise altering its permissions. to do so, you shoul
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!