1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
9

First one t send a message gets brainiest

Computers and Technology
1 answer:
monitta3 years ago
7 0

:):):):):):):):):):):)

You might be interested in
Which of the following is a Web browser? Exit Test A Windows B Comcast High-Speed C Microsoft Internet Explorer D Modem
yulyashka [42]
C. Internet explorer
Hope this helps :) please thank!
8 0
3 years ago
why are microphones or digital cameras unlikely to cause the damage that is found in repetitive strain injury?
sveta [45]
Because these devices do not require the repetitive motion that cause the damages.
5 0
3 years ago
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
........... Is ready made button for defining hyperlink on a slide​
Gwar [14]
Action Buttons An action button is a ready-made button that you can insert into your presentation and define hyperlinks. Use action buttons when you want to include buttons with commonly understood symbols for going to the next, previous, first, and last slides.
4 0
3 years ago
Explain how a message is transmitted from one computer to another using layers.
nevsk [136]
I need some answer chouices but they use iphones
7 0
3 years ago
Other questions:
  • Given an integer variable i and a floating-point variable f, write a statement that writes both of their values to standard outp
    12·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • Explain in two or three sentences why health science careers are among the fastest growing careers in
    9·1 answer
  • Text documents images audio clips and software applications are all examples of blank that are stored in files
    8·2 answers
  • What is a web server?​
    11·1 answer
  • When code is compiled it
    6·2 answers
  • For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (Sys
    14·1 answer
  • I'm having trouble with an assignment of mine. I'm making a text based adventure game for extra credit in my class and I'm stuck
    12·1 answer
  • A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing info
    11·1 answer
  • an engineer is writing a web application that requires some user input. the engineer has put a submit button on their page and n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!