1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
8

Can someone please help and answer the 6 questions on the bottom of the page

Computers and Technology
1 answer:
garik1379 [7]3 years ago
5 0

Ivan rigney

John benson      2

Mark nicholls      4

James  mitchell   7

Paul matthews   13

Neil hooper         8

You might be interested in
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Wendy has to capture a sculpture in the middle of the park at night. She is not able to get the entire sculpture into focus in o
dsp73

Answer:

Focus Stacking

Explanation:

F-stop stacking which is also referred to as image stacking is a powerful technique that improves the quality of an image by stacking images taken at different f-stops in order to improve corner sharpness and overcome blurriness. Once photographs are taken at different f-stops (focus stops), a final complete composite picture is created using only the sharpest portions of the photograph.

6 0
3 years ago
Where can I find answer key for electrician systems based on NEC 2017
lisov135 [29]

google or search through pvps

6 0
3 years ago
How would you classify an employee who communicates effectively, listens to coworkers, and makes good decisions?
vovikov84 [41]
He is the ideal employee and works correctly
4 0
3 years ago
Read 2 more answers
For Java, a program is converted from a text file of code into an executable file by the process of ?
Ludmilka [50]
Ever coded in Java before? What's the thing you have to do each time you save the code in order for it to run properly?
6 0
3 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • List three types of cardinalities for relationships within a relational database.
    9·1 answer
  • Which of the following are possible ways to
    6·2 answers
  • Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
    5·1 answer
  • What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
    11·2 answers
  • Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
    8·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Get two positive integers from the user. Write code to multiply the two numbers together using only addition or subtraction. You
    12·1 answer
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • Interest on loan paid to sangam stores Rs5000(journal entry)​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!