1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
15

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
Viktor [21]3 years ago
4 0

Answer:

editor

Explanation:

I just took the test and got it right.

You might be interested in
Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
Alenkasestr [34]

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

6 0
3 years ago
Read 2 more answers
1. Grouping Data in a Pivot Table can help you do what?
valentina_108 [34]

Answer:

1.Grouping data in a PivotTable can help you show a subset of data to analyze. For example, you may want to group an unwieldy list of dates or times (date and time fields in the PivotTable) into quarters and months, like this image. Note:  The time grouping feature is new in Excel 2016.

2.Select the rows or columns you wish to grouP

On the Data tab, in the Outline group, click the Group command.  

In the Group dialog box, select Rows or Columns and click OK.

3.Select the rows or columns you wish to ungroup.

On the Data tab, in the Outline group, click the Ungroup command.  

In the Group dialog box, select Rows or Columns and click OK.

4.

1.Launch Microsoft Excel.

2

Browse to and open the workbook file containing the pivot table and source data for which you need filter data.

3

Select the worksheet containing the pivot tab and make it active by clicking the appropriate tab.

4

Determine the attribute by which you want to filter data in your pivot table.  

The attribute should be one of the column labels from the source data that is populating your pivot table.

For example, assume your source data contains sales by product, month and region. You could choose any one of these attributes for your filter and have your pivot table display data for only certain products, certain months or certain regions. Changing the filter field would determine which values for that attribute are shown.

5

Force the Pivot Table Wizard or Field List to launch by clicking a cell inside the pivot table.

6

Drag and drop the column label field name you wish to apply as a filter to the "Report Filter" section of the pivot table field list.  

This field name may already be in the "Column Labels" or "Row Labels" section.

It may be in the list of all field names as an unused field.

7

Set the filter to display one of the values for the field.  

You can set the filter to display all values or only one. Click the arrow beside the filtered label and check the "Select Multiple Items" check box if you would like to select certain values for your filter.

Explanation:

PLZ MARK ME AS A BRAINLIST ;)

4 0
4 years ago
A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific auth
serious [3.7K]

Answer:

A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific authorization from an aircraft dispatcher is <u>1915Z (1 hour)</u>.

Explanation:

Under the domestic operations, an airplane landed on intermediate airport can remain their for not more than one hour so the time would me 1 hour.

Here the time represented by 1815Z and 1915Z is in Zulu Time Zone as depicted from letter "Z". The first two digits represent the hour (0-24) and the next two represent the minutes (0-59).

  • Here the landing time is 6:15 pm while departing time is after one hour that is 7:15 pm (1915Z).

i hope it will help you.

6 0
3 years ago
Which of the following reflects Moore's law? Multiple Choice The doubling of computer chip performance per dollar every two year
Katena32 [7]

Answer:

The correct answer is A.

Explanation:

Moore's Law states/predicts that the maximum number of transistors that can be used on integrated circuits (processors etc.) will be doubled every two years so it basically predicts an exponential growth in terms of transistors used.

Doubling the number of transistors used means that it will almost certainly increase the performance of the processors. Of course there are a lot of other variables that the performance depends on but Moore's Law is proven to be true and  is being used since 1960's. The answer given in option A is the one that best reflects on this law.

I hope this answer helps.

4 0
3 years ago
The best ways to navigate through your computer? a)Start button b)My Computer c)Windows explorer d)All of the above​
melomori [17]

Answer:

d all of above cause from tht all we can navigate through our pc

7 0
3 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    9·2 answers
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
    10·1 answer
  • The field names in a database are also known as__?
    12·2 answers
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    14·1 answer
  • Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical example
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!