1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
11

​passwords used as encryption ________ help to make hijacked data unusable.

Computers and Technology
1 answer:
DerKrebs [107]3 years ago
5 0
Passwords are used<span> for authentication and </span>encryption. Password entropy is a measurement of how unpredictable a password is.
Passwords used as encryption keys help to make hijacked data unusable. The encryption key is a <span>random string of bits created explicitly for scrambling and unscrambling data.</span>
You might be interested in
What is parallelism of microinstruction
Kitty [74]
The answer is Hardware level works upon dynamic parallelism whereas, the software level works on static parallelism. Dynamic parallelism means the processor decides at run time which instructions to execute in parallel,
8 0
3 years ago
What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
Ostrovityanka [42]

<u>Output:</u>

f1 in A

f2 in A

f1 in B

f2 in A

f1 in A

f2 in A

f1 in B

f2 in B  

<u>Explanation:</u>

In this snippet, the code makes use of virtual functions. A virtual function is defined as a function that is defined in the base class and redefined in the derived class. If the derived function accesses the virtual function, the program will get executed with the derived class’s version of the function.

In this code, we define the virtual function f1() in class A and also redefine it in class B which is the derived class of A. While executing the program, the function g which takes the object b (class B’s object) as a parameter. It will print class B’s version of f1() rather than class A’s version. This is working off the virtual function.

8 0
3 years ago
Which loan type requires you to make loan payments while you’re attending school?
mixer [17]
Direct Subsidized Loans<span> are available only to undergraduate students who have financial need. Direct Unsubsidized </span>Loans<span> are available to both undergraduates and graduate or professional degree students. </span>You<span> are not </span>required<span> to show financial need to receive a Direct Unsubsidized </span>Loan<span>.

Hope this answer helps! feel free to ask any additional questions :)</span>
4 0
3 years ago
Format Painter cannot be used to copy only character attributes. True or False
andrey2020 [161]
Format painter are used for copying texts, shape and even pictures. It is located on the top left part of your home button of your microsoft product. The statement " Format painter cannot be used to copy only character attributes." is absolutely False. As it can copy things individually.
4 0
4 years ago
What are the uses of ICT in health department write at least 6 uses in brief​
Alinara [238K]

Answer: See Explanation

Explanation:

The uses of ICT in health department include:

1. ICT helps in the improvement of the safety and the satisfaction of patients as new technologies are being developed to endure that patients are treated faster and their chance of survival increase.

2. ICT helps in looking for prevention measures which will be used to eradicate diseases.

3. ICT helps in the storage of medical data electronically. This will help in the easy retrieval of information.

4. ICT helps in the spread of information and also ensures distant consultation which are essential to achieving health related goals. e.g telemedicine.

5. ICT helps in the easy and fast spread of information and also facilitates cooperation and enhances teamwork among the health workers.

6. ICT brings about efficiency and effectiveness of administrative systems.

4 0
3 years ago
Other questions:
  • In a(n) ________ either one condition or some other condition must be met in order for an event to take place.
    11·1 answer
  • Write a statement containing a logical expression that assigns true to the
    13·1 answer
  • What does it mean for a design to be content driven
    12·1 answer
  • If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
    13·1 answer
  • In Marvel Comics, what imaginary rare metal is an important natural resource of Wakanda, the home country of Black Panther?
    15·1 answer
  • Write a program that simulates rolling one die using the following steps: 1. Prompt the user for the number of sides on the die.
    13·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • Which of these is NOT a benefit of being connected 24/7?
    11·1 answer
  • You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
    9·1 answer
  • Lucy wants to access the webpage. She is using her computer to access the webpage. What types of information will be in one fram
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!