1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
12

Write a recursive function encode that takes two Strings as an input. The first String is the message

Computers and Technology
1 answer:
jasenka [17]3 years ago
4 0

Answer:

85

Explanation:

jdjdjdjfjfjcjjcjrtgtggtfg g hi i

You might be interested in
Melanie uses an old compact disk to store her company's contract documents. She finds out that she cannot access any documents b
const2013 [10]

Answer:    The risk of obsolescence

Explanation:  This is in fact the risk that some process, technology or hardware used in the company is outdated, so there are newer, more innovative products, hardware, etc. In this way, the use of such outdated technologies and the like, creates the opportunity to reduce competitiveness in the market, which directly affects the point of each company, which is profit. So in this case too, the risk of obsolescence led to the situation that outdated technology, specifically, the use of an old compact disc, prevents a smooth business process. Not keeping up with new technologies creates this kind of risk, which consequently leads to the inability to access certain data required for the operation of the company, which affects profit.

8 0
3 years ago
WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of
gayaneshka [121]

Answer:

Hacktivists

Explanation:

Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.

5 0
3 years ago
Is my document folder located at taskbar​
KiRa [710]
Nope its located at your my computer
8 0
3 years ago
Mike needs to export some animation videos from his smartphone to an online platform. Which common file format can he use for th
Anastasy [175]
The answer would be b
8 0
3 years ago
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of
NeX [460]

The answer is

Recipient's ability to open file

Size of file

Sometimes, it might occur that the email message attachment you’ve sent to someone has an error or is corrupt and thus, limits the recipient ability to open the file. Another factor is the size of the file. All email servers limit the size of the file attached in an email that a recipient can receive mainly because of security reasons. Google Mail, for instance, only allows you to send 25MB only. This might limit the ability to attach files to e-mail messages as well.

3 0
3 years ago
Read 2 more answers
Other questions:
  • In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d.
    11·1 answer
  • What are 5 actions that you can do to take care of your camera
    14·2 answers
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
    10·1 answer
  • A security policy is a
    11·1 answer
  • What does this button do?
    13·1 answer
  • What is technology??
    12·1 answer
  • I need help with this question!!
    8·1 answer
  • The _______ displays the name of the open file and the program
    11·1 answer
  • What is the function of ROM?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!