Answer:
chemistry is very important because everything you do is chemistry . our body is made up of chemicals . chemicals reactions occurs when be breathe ,eat , etc . All matter is made of chemicals so that chemistry is very important in our life
The primary technology that would enable the company to achieve this goal is Blockchain technology
- Blockchain is commonly defined as an enclosed, encrypted, distributed database that is distributee in a wide range of multiple computers or nodes that are part of a community or system.
- It is an exciting technologies as it helps to limit the incidence of security breaches by even its own users.
- With Blockchain, a company can be able to guard against thefts of their products and also monitor them.
From the above we can therefore say that the answer to The primary technology that would enable the company to achieve this goal is Blockchain technology is correct
Learn more from:
brainly.com/question/24875333
Answer:
FF-FF-FF-FF-FF-FF and 255.255.255.255
Explanation:
FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.
255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.
Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255
Answer:
message confidentiality
Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.
message integrity
The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.
Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.
Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.
Explanation:
Answer: Spreadsheet Software
If Kevin would use a spreadsheet software, he will be able to input all of the statistical data and have the software generate graphs of the data that he has inputted into the spreadsheet. Using a spreadsheet software, Kevin will also have access to changing the graphs data whenever an anomaly has been detected.
Some of examples of these software would be:
- Microsoft Excel
- Open Office
- Google Sheets
- LibreOffice