1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
3 years ago
10

Криптографический метод защиты информации?

Computers and Technology
1 answer:
Andru [333]3 years ago
5 0

Answer:

the answer is green pineapples

You might be interested in
What level of system and network is required for cui
galben [10]

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

6 0
3 years ago
Write one for loop to print out each element of the list several things. then write another for loop
Kay [80]

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

6 0
3 years ago
Can someone please help with this thanks luvs c
aivan3 [116]

Answer:

HELLO, be nice spread love... DO NOT HATE ON OTHERS

░░░░░▐▀█▀▌░░░░▀█▄░░░

░░░░░▐█▄█▌░░░░░░▀█▄░░

░░░░░░▀▄▀░░░▄▄▄▄▄▀▀░░

░░░░▄▄▄██▀▀▀▀░░░░░░

░░░█▀▄▄▄█░▀▀░░

░░░▌░▄▄▄▐▌▀▀▀░░ This is Bob

▄░▐░░░▄▄░█░▀▀ ░░

▀█▌░░░▄░▀█▀░▀ ░░ Copy and paste him so he can take over brainly.

░░░░░░░▀███▀█░▄░░

░░░░░░▐▌▀▄▀▄▀▐▄░░

░░░░░░▐▀░░░░░░▐▌░░

░░░░░░█░░░░░░░░█░

COPY AND PASTE LETS DEFEAT BRAINLY

Explanation:

8 0
3 years ago
How do i answer a question on brainly????
ddd [48]

Answer:

there is an answer button below the questions

Explanation:

7 0
3 years ago
Read 2 more answers
The function below takes one parameter: a dictionary (dictionary). Complete the function so that it prints out each value stored
frosja888 [35]

Answer:

  1. def processDict(dict):
  2.    for x in dict:
  3.        print(dict[x])
  4. dictA = {
  5.    "Name": "Tom",
  6.    "Age": 21,
  7.    "Gender": "Male"
  8. }
  9. processDict(dictA)

Explanation:

Firstly create a function and name it as processDict that takes one input dictionary, dict (Line 1).

Create a for loop to iterate through each of the dictionary key, x, and use that key to look up the corresponding value and print it out (Line 2-3).

We test the function using a sample dictionary (Line 5-11). We shall get the output:

Tom

21

Male

3 0
3 years ago
Other questions:
  • In what stage of writing does publishing occur
    14·1 answer
  • What are sums of money that are given out for specific reasons?
    5·2 answers
  • A computer company has $3840000 in research and development costs. Before accounting for these costs, the net income of the comp
    5·1 answer
  • 1. Actuators apply mechanical force in the form of pressure to overcome
    10·1 answer
  • An associate is seeking advice on which device to purchase for a friend who is a business owner. The friend needs the ability to
    13·1 answer
  • Two methods defined within a class are shown below. What can be said about the variable x used in both methods?
    10·1 answer
  • Write the definition of a function named isSorted that receives three arguments: an array of int , an int that indicates the num
    11·1 answer
  • There are some network modeling tools that can ________ the existing network.
    12·2 answers
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • What is computer forensics? Where and how would an IT auditor use thisresource?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!