1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
7

Select one of the wrong answer from question 1 and explain why it is ironic.

Computers and Technology
1 answer:
matrenka [14]3 years ago
3 0
There are no questions
You might be interested in
A Color class has three public, integer-returning accessor methods: getRed, getGreen, and getBlue, and three protected, void-ret
jek_recluse [69]

Answer:

The following code are:

public void dissolve() {

setRed(getRed()+1);

setGreen(getGreen()+1);

setBlue(getBlue()+1);

alpha+=1;

}

Explanation:

Here, we define the void type function "dissolve()" inside it, we set three function i.e, "setRed()", "setGreen()", "setBlue()" and then we increment the variable "alpha" by 1.

Inside those three mutators method we set three accessor methods i.e, "getRed()", "getGreen()" , "getBlue()" and increment these accessor by 1.

The values will not be returned by the mutator functions, the accessor will be returned the values.

6 0
3 years ago
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, t
Nikolay [14]

Answer: B) design

Explanation:

  • Design walk-through is the method done while designing codes through which assurance regarding validity and accuracy of design is evaluated.
  • Reviewing of codes design ,content ,GUI(Graphical user interface) design and production processing components are done at this stage.This steps gives the surety about all the decision and features are correct and quality is maintained.
  • Other options are incorrect because unit walk-through is reviewing the complete unit or system.Testing walk-through and user walk-through are not the technical term of engineering field.
  • Thus, the correct option is option(B).
8 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
2 years ago
Other questions:
  • How do particles move at higher temperatures compared to how they move at lower temperatures?
    10·1 answer
  • What types of storage can be used to access your data on another computer?
    7·2 answers
  • Which type of weathering creates karst topography?
    5·1 answer
  • A website for a certain political party or candidate is likely to have unbiased
    6·1 answer
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • Computing is the provision of IT services on demand.
    9·1 answer
  • PYTHON CODING QUESTION
    10·1 answer
  • - Discuss the input-process-output model as it relates to program development.
    12·1 answer
  • Write a short essay about the best rotary-wing aircraft ever. It must be a specific aircraft and consist of three paragraphs. In
    9·1 answer
  • Cookie Snooping
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!