1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
2 years ago
14

What are the missing whole numbers on this number line? Enter your answers in the boxes. plz show work I'm I need answer 3rd gra

de​

Computers and Technology
1 answer:
adell [148]2 years ago
5 0
1 3 and 4... you are just counting up from 0
You might be interested in
A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
MrRa [10]
Yes you will mate, hope this helps!
7 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
Which is the shortest and simplest tax form? <br> 1040 long form <br> 1040EZ<br> 1040A<br> 140E
Kay [80]
The answer is 1040EZ. That is the shortest and simplest tax form. 
7 0
3 years ago
Read 2 more answers
The following is a training dataset that has ten one dimensional objects.
grandymaker [24]
Yes no no false . . . .
6 0
2 years ago
Who can help me please? ​
malfutka [58]

Answer:

what do you need help with

4 0
3 years ago
Other questions:
  • Which options correctly describe Andrew's job role?
    6·1 answer
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) pre
    8·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the
    15·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Write a pseudocode to calculate the volume of a cylinder​
    12·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • What is a key differentiator of Conversational Artificial Intelligence (AI)
    11·1 answer
  • What actions might contribute to recommendations you see online?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!