1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
5

I am not a living being, I am a cylindrical shape that has three to eight sides. I never die. I can build anything again. What i

s this puzzle, knowing that one of these hints is wrong​
Computers and Technology
1 answer:
Setler79 [48]3 years ago
4 0

Answer:

A shape

Explanation:

You might be interested in
A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
lesya [120]
The value displayed in A4 is 24
5 0
3 years ago
Give brainliest if you tell me the can tell me the most random thing
Scorpion4ik [409]

Mood

Explanation:

Because it gets changed by the time you are happy or sad. Same that while you are reading if you like your. mood gets good but if you dont find this ans satisfied your mood gets changed.

3 0
3 years ago
A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
nordsb [41]

Answer:

true

Explanation:

7 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
Edhesive Intro to CS Code Practice 1.8
Nonamiya [84]

<em>Questions:</em>

<em>CS Code Practice 1.8  Question 1:</em>

<em>Write a code that accepts the user's age as an input, then print their age in 10 years.</em>

<em></em>

<em>CS Code Practice 1.8  Question 2:</em>

<em>Write a code that accepts a whole number as an input, subtracts 5 and print the answer</em>

<em></em>

Answer:

Question 1:

currentage = int(input("Enter your age: "))

print("Your age in 10 years is "+str(currentage + 10))

Question 2:

userinput = int(input("Enter a whole number: "))

print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))

Explanation:

There are two questions in this category and I don't know which of them you need; So, I answered both.

Question 1:

This line prompts user for age

currentage = int(input("Enter your age: "))

This line adds 10 to user input and prints the result

print("Your age in 10 years is "+str(currentage + 10))

Question 2:

This line prompts user for a whole number

userinput = int(input("Enter a whole number: "))

This line subtracts 5 from the whole number and prints the result

print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))

6 0
2 years ago
Other questions:
  • What exactly is a byte? A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one speci
    10·1 answer
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
    7·1 answer
  • How to write greater than or equal to in excel if function
    7·1 answer
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • Which of the following best explains what happens when a new device is connected to the Internet?
    9·1 answer
  • A=4x^2.(x-2y)-20x.(2y-x)
    12·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
  • Write a recursive function called digit_count() that takes a positive integer as a parameter and returns the number of digits in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!