1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
11

A message with 3000 bytes gets encoded using the scheme Base64. What will be the size of the encoded message?

Computers and Technology
1 answer:
prohojiy [21]3 years ago
5 0

Answer:

4000 characters

Explanation:

Base64 encodes each set of three bytes into four bytes.

So 3000 * 4/3 = 4000 characters.

You might be interested in
The scientific process is most similar to what
Papessa [141]

Answer:

A dyagram

Explanation:

Have a nice day.

-London

8 0
3 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
Where is clipboards?
gavmur [86]
Clipboards are memory spaces specially made for copy and paste purposes. Sadly clipboards spaces can't be manipulated and can't be located. But there are applications that could fill in these clipboard problems such as Clipper Plus.
8 0
3 years ago
When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
Artist 52 [7]

Answer:

a. dashboard

Explanation:

In almost every program or webpage where you log in with a personal account. The first screen that contains all your pertinent information and the controls/tools for your account is known as the dashboard. Here you are able to adjust, modify, fix, and analyze all aspects of your account, including the data it contains. The dashboard is extremely useful and often times a necessity for every application.

7 0
3 years ago
What are the 3 dimension of an information system?
Ne4ueva [31]

Answer:

There are three dimensions of information systems ; organizational, management, and technology. Senior management always make decisions, so senior management is required to understand these three dimensions to make better decisions of the business through information systems.

3 0
3 years ago
Other questions:
  • an internet connectivity plan is also known as a ________. a) text plan b) data plan c) mobile plan d) network plan
    8·1 answer
  • Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
    14·1 answer
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • What is the maximum rate at which computers A and B can communicate, via router X? (your answer should be in Mbps)
    12·1 answer
  • What is ethernet? But can somebody to explain me more accurately than wiki and books.
    9·1 answer
  • List two functions of the UPS​
    10·1 answer
  • Which type of choir often sings AND dances while they perform?
    9·1 answer
  • 1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9
    5·1 answer
  • You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide
    12·1 answer
  • Computer-aided design software is used by ________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!