1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
13

William would like to sort a list of items after the data is already entered.

Computers and Technology
2 answers:
Reptile [31]3 years ago
4 0
It is number I think
Afina-wow [57]3 years ago
4 0
I believe it’s symbol
You might be interested in
The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
BaLLatris [955]

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

8 0
3 years ago
Boolean logic deals with statements having one of _____ values.
Alexxandr [17]

Answer:

2 values

Explanation:

boolean statements can only be True or False

6 0
3 years ago
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be
olasank [31]

Answer:

a. True

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be subjected to frequency analysis.

The Playfair Cipher is generally considered to be the best multiple letter encryption cipher because it processes digrams in the plaintext as singular units and translates them directly into ciphertext digrams.

In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.

5 0
3 years ago
Which two statements show cultural effects of computers and the Internet?
padilas [110]

Answer:

I think it is A,  Melissa says "LOL" instead of laughing at a joke her friend told.

5 0
3 years ago
Other questions:
  • When saving a document or drawing, you determine the destination folder in which the file will be saved by?
    6·1 answer
  • The organization of logistics activities within a firm depends on a number of factors, including the number and location of cust
    10·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • You are asked to write an app to keep track of a relatively small music library. The app should load song information from a dat
    14·1 answer
  • Why is brainly not working it say im logged out rn but im not i cant acces anything but this
    12·2 answers
  • Welckljhjkljkllhklk fgn. fghf gh
    15·1 answer
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Which two features could be added to a game using an "if () then " block
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!