1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
5

Como se diseña y produce un material audiovisual

Computers and Technology
1 answer:
4vir4ik [10]3 years ago
8 0

Answer: can you translate it please?

Explanation:

i dont understand what it says

You might be interested in
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
Mamont248 [21]

Answer:

Harley-Davidson Motor Company

Explanation:

Harley-Davidson produces and sells custom-made, touring as well as cruiser motorcycles that feature elegant styling,  modern innovative design, and high quality performance with the ability to customize to ones taste.  Harley-Davidson moved 95% of their x86 server workloads to virtualized environments utilizing VMware infrastructures as of 2018. They report to have being able to have higher system availability, effective and simple disaster recovery capabilities, improved operation efficiencies, and cloud-ready infrastructure. One of the major challenges of virtualization is Security, Virtual systems can easily get compromised.

8 0
3 years ago
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?
vlabodo [156]
Công nghệ đã thay đổi cách mọi người sử dụng để giao tiếp ở nơi làm việc hiện đại
6 0
3 years ago
L
Artist 52 [7]

Answer:

I tried, I falid, I sorry :(

Explanation:

......

5 0
3 years ago
Other questions:
  • What button is marked with the little hollow square at the top of the right window
    7·2 answers
  • What is the name of the amount of space between the content of a document and the edge of the page?
    13·1 answer
  • If you enjoy exploring,"what would happen if"types of questions and activities,a career in science or technology might be a good
    7·1 answer
  • What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwh
    12·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • What is HTML ? <br>Give a small description about html
    12·2 answers
  • What is the meaning of the concept (atomically)
    11·1 answer
  • What is an rgv in coding
    10·2 answers
  • Which statement best describes an advantage of using the Subtotal dialog box?
    14·1 answer
  • What is the biggest problem with technology today?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!