1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
10

How does the technology work

Computers and Technology
2 answers:
oee [108]3 years ago
7 0

Answer: technology work by chips wires in the botton of it or in the back of it and there metel in it they wire thing to it to make it better like phon

Ivan3 years ago
6 0

Answer:  it does – or perhaps appears to do – in the world.

Explanation:

sorry if am not right have a nice day lol

You might be interested in
Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?
Alex73 [517]
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
3 0
3 years ago
Read 2 more answers
What type of device can be used to block unwanted traffic initiated from the internet and can also restrict internet access from
statuscvo [17]
It is the firewall exactly.
4 0
3 years ago
true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
bulgar [2K]

Yes , it’s true. In a known-plaintext attack (kpa), the cryptanalyst can only view a small portion of encrypted data, and he or she has no control over what that data might be.

The attacker also has access to one or more pairs of plaintext/ciphertext in a Known Plaintext Attack (KPA). Specifically, consider the scenario where key and plaintext were used to derive the ciphertext (either of which the attacker is trying to find). The attacker is also aware of what are the locations of the output from key encrypting. That is, the assailant is aware of a pair. They might be familiar with further pairings (obtained with the same key).

A straightforward illustration would be if the unencrypted messages had a set expiration date after which they would become publicly available. such as the location of a planned public event. The coordinates are encrypted and kept secret prior to the event. But when the incident occurs, the attacker has discovered the value of the coordinates /plaintext while the coordinates were decrypted (without knowing the key).

In general, a cipher is easier to break the more plaintext/ciphertext pairs that are known.

To learn more about Plaintext Attack click here:

brainly.com/question/28445346

#SPJ4

6 0
1 year ago
Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
Marina86 [1]
Divide 1210 by 16  and write reminder divide until value zero 

first step divide 1210 by 16 =  10 
then 75 divide by 16 =  11
4 

we can write 4 B A 
in hexadecimal 

4 0
4 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
Other questions:
  • Find the Mechanical Advantage and the maximum separation load for a wedge (length = 6 inches and height = 3 inches) used to spli
    12·1 answer
  • All of the following are parts of the word processing window except _____. \
    9·1 answer
  • How do ice and water on the ground affect incoming solar radiation? They filter 22 percent of solar radiation that reaches the s
    9·2 answers
  • Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players. MPEG-4 an
    13·2 answers
  • Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she wil
    6·1 answer
  • We have constructed a Player Class for you. Add the following: public static variable: int totalPlayers Static variable should b
    8·1 answer
  • Disuss the roles of hardware,software and databases in regard to computer based information systems
    7·1 answer
  • Consider the following static method.
    9·1 answer
  • A global clothing company is looking to create a more immersive shopping experience for customers.What is a way the company can
    14·2 answers
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!