1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
10

Your welcome 95 points gg

Computers and Technology
2 answers:
dexar [7]3 years ago
6 0
Thank you so much c:
STatiana [176]3 years ago
4 0

Answer:

tysm :))

Explanation:

have a great day

You might be interested in
The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
Free_Kalibri [48]

Answer:

Vigenère

Explanation:

It is a method of encrypting alphabetic text by using a form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, ie using multiple substitution of alphabets. The encryption is done using a Vigenère table.

To encrypt a message using the Vigenère Cipher you choose a keyphrase. Then repeat this keyword over and over until it is the same length as the original text; this is referred to as a keystream.

4 0
3 years ago
Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
TiliK225 [7]

Answer: Have you gotten an answer yet?

6 0
3 years ago
If you could represent yourself with one object from your home what would it be ?
user100 [1]

Answer:

cross

bc im religous and stuff (0_0)

8 0
2 years ago
Read 2 more answers
A downloaded executable file may contain harmful software known as
mylen [45]

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

8 0
3 years ago
Read 2 more answers
Non related to school but im interested,<br><br> Who here actually watches dream smp be honest
Kamila [148]
I did- but I don’t anymore
3 0
2 years ago
Read 2 more answers
Other questions:
  • What the address for dns server that the eorkstation will use?
    10·1 answer
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • Edhesive coding practice 3.4​
    13·2 answers
  • Which tab on the Chart Tools Contextual tab will contain commands that are used to change the style of charts and to edit chart
    12·2 answers
  • Two Technicians are discussing ShopKey Pro. Technician
    14·1 answer
  • Plz answer this....quickkkkk​
    7·2 answers
  • State Whether the given statement are TRUE OR FALSE. 13X1=13
    10·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!