1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
5

Computer programming

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
5 0
Sjanqknjwolq esjkalqlkd
You might be interested in
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
The part of the computer that provides access to the internet is the-?
Rina8888 [55]
The answer is D. Modem
7 0
3 years ago
Read 2 more answers
Explain how communication facilitate cordination​
Oksana_A [137]

Answer:

Communication greatly helps in coordination. Effective communication facilitates information and exchange of ideas which helps to achieve the common purpose. Coordination is facilitated by exchange of such ideas and information and brings people together.

Explanation:

4 0
3 years ago
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations
Pavlova-9 [17]

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of <u>fog</u>  computing operations.

The correct option is C.

<h3>What is computing operations?</h3>

An action that is taken in computing to complete a certain task is referred to as an operation. The five fundamental categories of computer operations are input, processing, output, storing, and control. The five major functional components of a computer system each carry out one or more computer activities.

<h3>What are the basic computing operations?</h3>

Arithmetic and logical operations are the two primary sorts of work that CPUs carry out. In contrast to logical operations, which compare two numbers, arithmetic operations involve basic math concepts like addition and subtraction.

<h3>What is  fog  computing operations?</h3>

Both 5G and fog computing

Fog computing refers to a type of computer architecture in which a network of nodes continuously collects data from Internet of Things (IoT) devices. These nodes have millisecond response times and process data in real-time as it comes in. Every so often, the nodes communicate to the cloud analytical summary data.

To know more about computing operations visit:

brainly.com/question/18095291

#SPJ4

I understand that the question you are looking for is:

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations.

A) OpenStack

B) cloud

C) fog

D) RFID

8 0
2 years ago
Some system analysts argue, "Give users what they ask for. If they want lots of reports and data, then that is what you should p
steposvetlana [31]

Answer:

I align with the second group of System Analysts.

Explanation:

Actually, in the IT world  most users want detailed explanations of processes, reports and data during their fault resolutions. However, they do not really know what to do with these nor would even make use of it when a fault occur on their system again. Thus, it is better for "<em>Systems Analysts to let the users know what information can be obtained from the system. If you let the users dictate, then you will never get anywhere and/or go down costly paths because the end-users really don't know what they want and do not have the technical knowledge or understanding of code, data-basing, and systems."   </em>

6 0
4 years ago
Other questions:
  • Hello... does anyone know why Brainly notifications aren’t working???
    11·2 answers
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    5·1 answer
  • The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in
    9·1 answer
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • Read the following sentences: “The Soviet Union’s famous launch of a satellite called Sputnik had been an embarrassment for the
    12·1 answer
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • Examples of intermediate technology​
    7·2 answers
  • The metric unit used for length
    5·1 answer
  • Scott sends his backups to a company that keeps them in a secure vault. What type of backup solution has he implemented?
    5·1 answer
  • _________ analysis is a data mining application that discovers co-occurrence relationships among activities performed by specifi
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!