1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
9

A) Write "T" for true statement and "F" for false statement.

Computers and Technology
1 answer:
andrezito [222]3 years ago
6 0

Answer:

ii. False

iii. True

Explanation:

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but easily understandable to computers.

In view of the above, we can deduce that programming in machine level language is very difficult for humans.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

Generally, the Rectangle tool is used to draw rectangle shape (vector and pixel-based)​ in Adobe Photoshop.

You might be interested in
As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
pickupchik [31]

Answer:

Excel Help

Explanation:

Press F1 key to open the excel help window

Or you can also click the excel help button to launch the help window.

Type for whatever you are seeking help for and you will notice suggestions as you type something. These suggestions include online and offline results. If there are too many results then try searching offline it will narrow down the results.

After typing the text and hitting enter, the excel help returns several related topics on the searched query. You can browse through these topics and get help from excel.

5 0
3 years ago
ASCII contains codes for most of the languages in use today.<br><br> True or False
Harrizon [31]

False, Dont take my word but google is your friend

5 0
3 years ago
If several programs or apps are running simultaneously, your computer or device might use up its
kirill [66]

Answer: I am pretty sure it's RAM

Explanation:

I'm not 100% positive bc I haven't gotten my scores back yet but I think that's it.

7 0
3 years ago
An employee has been writing a secure shell around software used to secure executable files. The employee has conducted the appr
Marat540 [252]

Since the employee has been writing a secure shell around software used to secure executable files and he has also conducted a self-test, he seems to be working in the development environment.

C. Development

<u>Explanation:</u>

The development environment requires an employee to work with algorithms and programming techniques to make programs/software's that are further passed on to the testing department to ensure that they are ready to be launched or deployed.

Although it is the job of testing environment and testers to conduct tests on the developed software's/programs, it is always a good practice to run some self-tests to ensure the efficiency and accountability of a program/software.

3 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Other questions:
  • What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
    8·1 answer
  • What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
    5·1 answer
  • What problems does the swim coach have? Use details from the story to support your answer.
    7·1 answer
  • A _____ network security application that Prevents access between a private and trusted network and other untrusted networks
    9·1 answer
  • Which camera required the photographer to project the image on paper
    9·2 answers
  • HELP! WILL GIVE BRAINLYEST!
    13·1 answer
  • What type of data would a RDBMS store in a linked list, two-way linked list, or B-trees? What are the advantages and disadvantag
    5·1 answer
  • What is the full form of USB​ ?
    15·1 answer
  • Jacob has a text file open, and he is typing on the keyboard. What is the best description of how the
    8·1 answer
  • PLS ANSWER. MARKING CORRECT ANSWER AS BRAINLIEST
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!