1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
9

What are your thoughts on copyright? (Write 2 or more sentences)

Computers and Technology
2 answers:
ikadub [295]3 years ago
7 0
I personally believe that copyright is a way of credit theft (because it is). Taking someone else’s work and presenting it as your owns.

How y’all doin?
victus00 [196]3 years ago
5 0

Answer:

I look down on copyright. To take someone else's work and disguising it as your own seems like a form of theft.

You might be interested in
When you declare a variable of a basic, primitive type, such as int x = 10;, the memory address where x is located holds the ___
Nadya [2.5K]

Answer:

Answer is (d) value of 10

Explanation:

Usually when we write "int x=10;", a memory space is allocated for an integer variable with name x, and content 10.

8 0
3 years ago
Read 2 more answers
Explain in details the evolution of computers​
Colt1911 [192]

Answer:

Evolution of computer technology can be divided into five generations. First generation computer consisted of vacuum tubes and they were used from 1943-1958. ... Third generation (1966-1973) computer consisted of integrated circuits (IC) i.e. many transistors in single silicon chip.

<em><u> </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em><em><u>Mark as brilliant</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em>

3 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
What is the molar mass of AuCI2
andriy [413]

Answer:267.8726

Explanation:

5 0
3 years ago
Which cell contains an absolute reference?
Softa [21]

Answer:

An absolute cell reference is a cell address that contain a dollar sign $ in row and column coordinate or both. We use absolute reference to keep row and column constant

Example: C5*$C$2

The reference to C2 is absolute and will not change when copied.

5 0
3 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
    8·1 answer
  • The ___________ button represents the start of a hyperlink in Table of contents.
    7·1 answer
  • The person who suggested that the continents were once a supercontinent, called Pangaea, but slowly drifted apart was who
    10·2 answers
  • Answer ASAP and I'll give brainliest.
    10·2 answers
  • Which computer network component connects two different networks together and allows them to communicate?
    8·2 answers
  • Help with these 2 questions srry for the horrible pic​
    13·2 answers
  • Assume that the variable data refers to the list [5, 3, 7]. Write the expressions that perform the following tasks: a. Replace t
    8·1 answer
  • What is the full form of the OS?​
    15·2 answers
  • What is the importance of server modules and add-ons?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!