1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
14

Can someone who is good at 9th class IT (cbsce) can help me in my homework​

Computers and Technology
1 answer:
postnew [5]3 years ago
4 0

Answer: yeah

Explanation:

You might be interested in
A moldboard was a feature and technological development of what device
wlad13 [49]
The moldboard is a curved iron wedge formed by the curved part of a steel plow blade that turns the furrow <span>used to lift and turn the soil.</span><span>
A moldboard was a feature and technological development of the device plow.
</span>It was used in farming for initial cultivation of soil, for preparation for sowing seed or planting to loosen or turn the soil. 
5 0
3 years ago
the block cipher attack technique that attempts to retrieve the key by performing decryption and encryption simultaneously on a
tankabanditka [31]

The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

<h3>What is plaintext attack?</h3>

The known-plaintext attack is a type of cryptanalysis attack in which the attacker has access to both the encrypted and plaintext versions of the target data. These can be used to reveal additional hidden information, including code books and secret keys. An attack using known plaintext occurs when the attacker has access to pairs of known plaintexts and the ciphertexts that go with them.

The objective is to figure out the secret key (or keys) or to create an algorithm that would enable him to decrypt any additional messages. Ordinary readable text before it is converted into ciphertext in cryptography is known as plaintext, as is readable text that has been recovered from encryption. Not all data inputted into or outputted by encryption methods is plaintext.

Hence,  The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

To learn more about cryptanalysis attack refer to:

brainly.com/question/19202523

#SPJ4

3 0
1 year ago
Alan is working on a draft document. He wants the document to have more white space. He can do this by changing the line spacing
Alex

It is a true statement that changing the line spacing will make the document have more white space.

<h3>What is a line spacing in word document?</h3>

This refers to the distance between upper and lower lines of text.

These line spacing are tools that make text much more readable because its places distance between the word lines.

By using a line spacing, there will be more spaces and white spaces on the word document.

Therefore, the statement is a correct statement.

Read more about line spacing

<em>brainly.com/question/25277953</em>

8 0
2 years ago
Whats the correct answer
dem82 [27]
Line 2 or line 4 sorry if I’m wrong
7 0
3 years ago
Read 2 more answers
________________ are piece of programs or scripts that allow hackers to take control over any system.
Ber [7]

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.

3 0
3 years ago
Other questions:
  • Write a script that will generate random integers in the range from
    10·1 answer
  • OSHA has authority over the employers of
    5·2 answers
  • In a programming language, a(n) ______, or command, is a word with a predefined meaning​
    6·2 answers
  • When running JavaApplication8, the following output is seen on the display:
    15·1 answer
  • How does a hard drive work
    14·1 answer
  • Arun is 5 years older than Anu. five years ago, the ratio of their ages was 3:2 . find their present age​
    10·2 answers
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • 6. 6. While printing a document, what are the options available in the Settings section?
    9·1 answer
  • Items that represent features of smartphones apps
    12·1 answer
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!