1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
14

The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t

o say that. I hope all of you have a great day​
Computers and Technology
1 answer:
baherus [9]3 years ago
5 0

Answer:

thanks

Explanation:

You might be interested in
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
sergiy2304 [10]

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

3 0
2 years ago
_____ is an example of a professional networking site where you keep in touch with business contacts.
WINSTONCH [101]

Answer:

"LinkedIn" is the correct answer for the above question.

Explanation:

  • LinkedIn is used to build a connection between people and communicate. But it is used to connect only business type contacts.
  • So, when any user wants to make any business type of contacts, then he can do this with the help of making an account on LinkedIn and then add the business people on it.
  • The above question asked about the networking site which is used to connect the business contacts. This site is known as LinkedIn.
8 0
2 years ago
61:39 A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back
kobusy [5.1K]

Answer:

Sequence Numbers

Explanation:

In the transmission control protocol, the sequence number are used to put data back in order.

It is the number pattern that follows sequence. This is the number pattern which interprets data before they are returned by the recipient as an acknowledgement with its numbers.

When a sent data is out of order, the sequence number works towards correcting the sequence before sending its acknowledgement.

7 0
3 years ago
A poem for coduction
Nataly_w [17]
I don't know if you want a poem about conduction but if so here ya go

no matter how the heat
different temperatures meet
hot to cold how it's done
4 0
3 years ago
Read 2 more answers
A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage se
PtichkaEL [24]

A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage service should the company

use is

D. Amazon EFS

Explanation:

  • A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage service should the company

        use is

  • D. Amazon EFS
  • Amazon Elastic File System (Amazon EFS) provides a simple, a fully managed elastic NFS file system for use with AWS Cloud services.
  • EFS is NFS filesystem.
  • It has two storage classes,
  • the Standard storage class
  • the Infrequent Access storage class
  • Amazon EFS is highly suitable to support a broad spectrum of use cases from home directories to business-critical applications.
4 0
3 years ago
Other questions:
  • #The Fibonacci sequence is a number sequence where each #number is the sum of the previous two numbers. The first #two numbers a
    7·1 answer
  • For all those among our fans and SpongeBob fans which is better SpongeBob or amount us
    11·2 answers
  • The superclass Calculator contains: a protected double instance variable, accumulator, that contains the current value of the ca
    5·1 answer
  • What TYPE of flash drive is called when it saves your files safely? I'm going to use my friend computer that's why.
    5·1 answer
  • The HTTP protocol operates at which layer?
    7·1 answer
  • What makes someone an expert? What potential issues are there with this?
    10·2 answers
  • What is text formatting?​
    5·2 answers
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    12·1 answer
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!