1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

IF ANYONE ANSWERS YOUR QUESTION WITH SOMETHING LIKE THIS:

Computers and Technology
2 answers:
vova2212 [387]3 years ago
4 0

Answer:Thank you very much! A user names SShalomeea has been hacking today. Anyone with that photo is a spammer.

Serga [27]3 years ago
4 0

Answer:

oh ok thank you for the heads up

Explanation:

You might be interested in
How to reset windows 7 password without logging in
hammer [34]

Explanation:

<em>.</em><em>Reboot your laptop or PC. </em>

<em>Select the Repair your Computer option and press Enter. </em>

<em>The System Recovery Options window will popup, click System Restore, it will check the data in your Restore Partition and factory reset laptop without password.</em>

4 0
3 years ago
Read 2 more answers
The _____________ controls the internal operations of the computer's hardware, manages all of the devices connected to the compu
Nitella [24]

Answer:

The System Software (Operating System)

Explanation:

Examples of Operating Systems are Windows, MAC and Linux, these software are the foundation of every PC and manages all computer's resources

6 0
3 years ago
Why is IP configuration used with its components for network, broadcast, host addresses, and local host?
matrenka [14]

Answer:

GeoLocation

Explanation:

It is based on geolocation and wireless provider so it differs based on where and what hope this helps!

3 0
3 years ago
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
Len [333]

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

4 0
3 years ago
Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?
Svet_ta [14]

Answer:

The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:

1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.

2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.

Explanation:

7 0
4 years ago
Other questions:
  • 1
    14·1 answer
  • We need ____ pointers to build a linked list.
    6·1 answer
  • __________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
    6·1 answer
  • Which goal of design theory can be described as the proper distribution
    7·1 answer
  • 7. Four more than negative eleven times a number is 26.​
    7·2 answers
  • ANY MHA FANS SAY DEKU
    6·1 answer
  • WHAT ARE THE RISK OF DUST​
    15·1 answer
  • Which strategies for effective presentations is Ian using in his opening? Check all that apply.
    8·2 answers
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • Javascript and java are really just two slightly different names for the same language.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!