1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
11

What is the alogarithm for solving the perimeter of a triangle

Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
3 0

Answer:

 P = a + b +c

Explanation:

jkaksbajksnsn

You might be interested in
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. F
xeze [42]

Answer:

Above OSI Layer 3

Explanation:

5 0
3 years ago
To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
grandymaker [24]
That should be the replace function which performs word replacements in documents.
6 0
4 years ago
Who are the founders of the video-sharing site Blip?
rewona [7]

the Founders would be Justin Day


3 0
4 years ago
Which of the following is a special-purpose computer that functions as a component in a larger product?
Dominik [7]

Answer:  

Embedded Computer

Explanation:

  • An embedded computer is designed to perform a certain function and it is a component of a larger system.
  • An embedded computer has a dedicated function within a larger system and is incorporated as a part of a complete system rather than being a stand alone computer.
  • It is a microprocessor, micro controller based real time control system.
  • Its a combination of hardware and software that have a dedicated function to achieve a specific task. The also have peripheral devices for communication purposes.  
  • Digital Camera , ATM, Calculator, Digital Watch , Self-autonomous Vehicles, Security Camera , Washing Machine , Mp3 player, Microwave Oven , Fire Alarm, Smart Phone,Vending Machines, networking hardware like dedicated routers etc are examples of embedded systems.
  • Embedded computers are less expensive to produce, consumes less power, easier to maintain, do not require remote maintenance and easily customizable.

4 0
3 years ago
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • What is systems integration?
    12·1 answer
  • Which ONE of these usability goals is more important when designing software that someone would use only once or twice, such as
    13·1 answer
  • Someone please help me? Thanks!
    10·2 answers
  • What is the first thing Kernel does when WinLoad turns over the starttup process to it
    5·1 answer
  • Explain any one method of creating a presentation.
    10·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • My sister told me an extremely funny joke. what is the direct object for this sentence ?
    6·1 answer
  • How to view average for an assignment in gradebook in canvas.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!