1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
2 years ago
6

Consider the following code segments that are potential replacements for /* missing code */.

Computers and Technology
1 answer:
tankabanditka [31]2 years ago
8 0

Answer:

C. I and III only.

Explanation:

The segment code is text portion of the document of file. It contains executable instructions for the system. The temperature value increase is replaced by instructions which create the same output.

You might be interested in
Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
andriy [413]

Binary values are used to denote the 'ON' and 'OFF' state of a computer. The 'ON' state is denoted by the binary value '1'

  • The 'ON' state of a computer represents the mode when the computer system is running and can be used to perform computing operations.

  • The binary values '0' and '1' are used to designate the ON and OFF state.

  • When the computer is ON, it is designated by the binary value 1 ; while the OFF state is designated by the binary value 0.

Therefore, the number which signifies the ON state of a computer is 1.

Learn more :brainly.com/question/4722254

4 0
2 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
HELP ME ASAP
ruslelena [56]

it is title page and give me a ❤

3 0
3 years ago
Multiple Choice
zalisa [80]
Zeros and ones
Hope the helps
Godspeed
7 0
2 years ago
Other questions:
  • What is computer virus?
    8·1 answer
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • Which wireless device does the manager most likely have before being offered the upgrade by her supervisor?
    8·2 answers
  • • Write a program to find the maximum, minimum, and average score of players. The input to the program is a file containing play
    9·1 answer
  • Which statement best describes the cut and paste option in a word processor?
    6·2 answers
  • 30 POINTS! PLEASE ANSWER QUICK!!!
    12·1 answer
  • Which of the following statements is true regarding the e-mails that were collected from Marina and Rita's Cupcakes' key employe
    11·1 answer
  • create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
    11·1 answer
  • Conclusion for primary memory
    15·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!