1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
15

Who has pad let and wants to talk

Computers and Technology
2 answers:
vredina [299]3 years ago
8 0

Answer:

I do.

Explanation:

Ne4ueva [31]3 years ago
7 0

Answer:

no one

Explanation:

You might be interested in
_____ are fields that are used to personalize a mail merge document
Rzqust [24]

Answer:

The answer is A; rows of a spreadsheet data source.

Explanation:

8 0
2 years ago
An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
babunello [35]

The S3 encryption, <u>Server-Side Encryption with Customer-Provided Keys (SSE-C)</u>, allows the company to leverage Amazon S3 for storing data with given constraints.

What do you mean by S3 encryption?
S3 encryption <u>encrypts your </u><u>data </u><u>when it is written to disks in its </u><u>data </u><u>centers at the </u><u>object </u><u>level and decrypts it for you when you </u><u>access </u><u>it.</u> There is no distinction between accessing encrypted or unencrypted items as long as you authenticate your request and you have access permissions.

S3 encryption<u> </u><u>encrypts an item before saving it to disk when you use server-side </u><u>encryption</u><u>; the </u><u>object </u><u>is then decrypted when you download the object</u>. S3 encryption lets you safeguard the data you store in AWS S3 buckets online, which is crucial for sensitive data.

To learn more about S3 encryption, use the link given
brainly.com/question/9979590
#SPJ4

4 0
11 months ago
Data mining must usestatistics to analyze data.<br> True<br> False
Rasek [7]

Answer: True

Explanation: In data mining, they use statistics component for the analyzing of the large amount of data and helps to deal with it. Statistics provide the techniques for the analyzing, evaluating and dealing with the data that is known as data mining.Data statistics provide the help to organize large data in a proper form and then analyze it. Thus, the statement given is true that data mining must use statistics to analyse data.

4 0
3 years ago
Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
kumpel [21]

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\  2 & 17 & 1 \\   2 & 8 & 0  \\ 2 & 4 & 0  \\ 2 & 2 & 0   \\ 2 & 1 & 1\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\  2 & 1 & 1 \\  \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\  2 & 13 & 1 \\   2 & 6 & 0  \\ 2 & 3 & 1  \\ 2 & 1 & 1   \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\  2 & 8 & 0 \\   2 & 4 & 0  \\ 2 & 2 & 0  \\ 2 & 1 & 1   \\\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = <em>100011</em>

B) 3 = <em>11</em>

C) 27 = <em>11011</em>

D) 16 = <em>10000</em>

8 0
3 years ago
List the general steps that are used to configure a soho router and set up the network
marusya05 [52]
Configure the Internet connection. 

Configure the wireless router. 

Enable NAT. 

Configure DHCP

Secure the SOHO network.
7 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • Talking to a friend _____.
    5·2 answers
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • Which application is a digital version of a manual typewriter? A. Database B. Presentation C. Spreadsheet D. Word processor
    8·2 answers
  • How do I keep my computer and data safe and secure while using the Internet?
    14·2 answers
  • Cloud-based services can open doors to leveraging Artificial Intelligence (AI) without dramatically increasing risk. Which clien
    9·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a m
    11·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • Which characteristics support an agile mis infrastructure?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!