1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
11

WILL GIVE BRAILIST IF ANSWER RIGHT

Computers and Technology
1 answer:
Vesna [10]3 years ago
4 0

Answer:

See Photo For Matching.

You might be interested in
A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________.
storchak [24]

Answer:C) Uninterruptible power supply

Explanation:Uninterruptible power supply(UPS) is the device that is used when the input source of power does not work or fails and thus it acts as a power supply in the emergency situation.This electronic devices in the protection of the hardware components of computer system etc.

Other option are incorrect because power strips, surge protector and password generator are no the devices that work during the power black out situation.Thus, the correct option is option(C).

7 0
3 years ago
Caesar Cipher is an older and since outdated encryption technique used by Julius Caesar to "hide" messages he sent to his troops
netineya [11]

Answer:

c. UHPDLQ KRPH

Explanation:

The above question is missing key details.

The missing part of the question is

Suppose that you want to encrypt the following message: REMAIN HOME. Of the following, which would be a potential encrypted message using Caesar Cipher?

a. TGPBKP JPQG

b. SFNCKO IPNF

c. UHPDLQ KRPH

d. PFLBHO INND

Using Caeser Cipher with an offset of 3, the answer is option c, UHPDLQ KRPH

With the main text being, REMAIN HOME,

Notice that if you letter U is 3 letters after R

Letter H is 3 letters after E

Letter P is 3 letters after M

It continues like that till it gets to the last letter H,

Letter H is 3 letters after E

In conclusion if REMAIN HOME is to be ciphered with an offset of 3, it gives UHPDLQ KRPH

4 0
3 years ago
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
Prebuilt colors from a document are called
Artemon [7]

Answer:

Theme

Explanation:

Theme. a pre-built set of unified formatting choices including colors, fonts, and effects. Format. to change the appearance of text. Font.

8 0
3 years ago
Tim and Eric recently started a company focused on rehabbing old houses. Before they buy a house, they use software to create an
sp2606 [1]

Answer: True

Since both partners make informed decisions about the houses before actually implementing them with information from the software

Explanation:

CAD computer aided design is the use of computers to aid in the creation, modification, analysis, or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing or decision making

5 0
4 years ago
Read 2 more answers
Other questions:
  • The goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a di
    8·1 answer
  • Define the term e-learning​
    5·2 answers
  • When is a wrecker considered to be an emergency vehicle?
    12·1 answer
  • 8. Understanding the proper classification of a problem or fault
    10·1 answer
  • Ethics in businesses and organizations are made up of a set of moral principles that guide the organizations. Discuss how good w
    8·1 answer
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • Electrical sign connect mainly to​
    8·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • What is printed when the following code has been executed?
    9·1 answer
  • A vpn is used primarily for which purpose?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!