1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
2 years ago
10

Intelligent computer uses _________ to learn.

Computers and Technology
1 answer:
Olenka [21]2 years ago
5 0

Answer: a test

Explanation:

You might be interested in
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
ruslelena [56]

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

5 0
3 years ago
Which option offers predesiged formatting and design elements to facilitate the process of creating a document?
Mrrafil [7]
Templates......hope this helps you
5 0
3 years ago
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
The processor has a five-stage pipeline F D O E M S; that is, instruction fetch, instruction decode, operand fetch, execute, mem
lawyer [7]

Answer:

a) Internal Forwarding is not used = 26 clock cycles

b)Internal Forwarding is used= 22 clock cycles

5 0
4 years ago
You need to find out more about the fdisk utility and the commands associated with it before you set up a new linux system in ad
lutik1710 [3]

The man utility is a console based program that displays manual pages of other utilities, so for fdisk, you would use man -k fdisk to search for fdisk related manuals

7 0
4 years ago
Other questions:
  • A small company has developed a specialized software product that it configures specially for each customer. New customers usual
    14·1 answer
  • Max needs to study more effectively to get a better grade on his next exam. What can he do to improve his study habits? Check al
    10·2 answers
  • What type of media can be edited and published by anyone?
    6·2 answers
  • What type of interview would be most likely for the following scenario?
    11·2 answers
  • What do people in japan use to make anime
    5·1 answer
  • Is a router on the local network that is used to deliver packets to a remote network?
    15·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
  • Your company's network topology diagrams aren't very detailed so you're helping to improve them. The new set will have separate
    9·1 answer
  • Within how many days can a deleted view be restored?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!