1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
8

HELP!!!!!!!

Computers and Technology
1 answer:
Savatey [412]3 years ago
6 0

Answer:

mouse - input

printer - output

keyboard - input

speakers - output

headset - both

You might be interested in
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
Len [333]

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

4 0
3 years ago
You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and sett
Over [174]

Answer: The pharmacies and the employee and  patient  must be examined during the investigation.

Explanation:

8 0
3 years ago
_____ serves as a foundation for comparison or measurement.
sammy [17]

Answer: C

Explanation: Baseline is the starting point or used for comparison or measurement.

6 0
3 years ago
A thesaurus is an example of a(n)
Ivahew [28]

Answer:

D. online reference

Explanation:

An "online reference" refers to a<em> digital reference</em> that end users may utilize for their work or other daily activities. For example, if a person is looking for the <em>synonym of a particular word,</em> she may then refer to the thesaurus.

A blog is a website where you can find personal journals from different writers.

An e-book is an <em>"electronic book."</em> This allows people to read book digitally.

An e-zine is an<em> "electronic magazine." </em>This is a magazine in its digital form.

3 0
3 years ago
Read 2 more answers
What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.
ad-work [718]

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.

4 0
3 years ago
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • Rearrange the statements in the following order so that the program prompts the user to input: a. The height of the base of a cy
    12·1 answer
  • How does teamwork help in developing a quality outcome?
    7·1 answer
  • Given four inputs: a, b, c &amp; d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • 5. When resizing an object with the Select Tool, what keyboard key should you press to make it resize equally in all directions?
    11·1 answer
  • What is the difference between MAC address and IP address?<br> Thanks in advance
    6·1 answer
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • Tax preparation software can help prepare and file your taxes by _________.
    7·1 answer
  • Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!