1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
2 years ago
10

Type your response in the box. Imagine you purchased a new computer and you plan to install one operating system and a few appli

cation software. A known person offered you some installation CD's, but you found out that the software in the CD's were not purchased but were illegally copled. Would you use them/Install on your computer? State reasons for the actions you would take.​
Computers and Technology
2 answers:
faltersainse [42]2 years ago
5 0

Answer:

Yes

Explanation:

As long as they were legally copied

insens350 [35]2 years ago
4 0
The answer is no, you could get in trouble for fraudulent actions for installing illegality obtained items. Not only that, you could get a virus from the person who copied the disk
You might be interested in
COMPUTER SCIENCE:PIXELS
DIA [1.3K]
The number of bits used to represent each pixel determines how many colors or shades of grey can be displayed. For example, in 8-bit color mode the color monitor uses 8 bits for each pixel, making it possible to display 2 to the 8th power (256) colors/shades of grey.
3 0
3 years ago
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
ruslelena [56]

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

5 0
3 years ago
<img src="https://tex.z-dn.net/?f=954-696-0879" id="TexFormula1" title="954-696-0879" alt="954-696-0879" align="absmiddle" class
PSYCHO15rus [73]
The answer is -621 (that’s what my calculator said).... btw why didn’t you just use a calculator for this...?
5 0
3 years ago
I have a project on "USING ADVANCED FORMULAS". It wants me to make a spreadsheet to track payroll. I have no clue how to do this
ANTONII [103]
Try to do it on Microsoft word 2013
7 0
3 years ago
Arrange the steps involved in natural language generation.
Firdavs [7]

Answer:

1. accessing content from some knowledge base.

2. picking words and connecting them to form sentences.

3. setting the tone and style of the sentence.

4. mapping the sentence plan into sentence structure.

Explanation:

Natural language generation can be defined as a part of artificial intelligence (AI) which typically involves developing responses by an AI in order to enable the computer engage in a useful conversation.

This ultimately implies that, the computer has to generate meaningful data (phrases and sentences) from the internal database.

Basically, the steps involved in natural language generation in a chronological order are listed below;

1. Text planning: accessing content from some knowledge base.

2. Picking words and connecting them to form sentences

3. Sentence planning: setting the tone and style of the sentence.

4. Text realization: mapping the sentence plan into sentence structure.

4 0
3 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • The goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a di
    8·1 answer
  • What's the difference in unicode value between 'e' and 'a'? (consult a table of unicode values):?
    7·1 answer
  • Is there a way to search your computer for all music files on it?
    9·1 answer
  • What does editing refer to
    6·2 answers
  • The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d
    5·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • The ___ value is the number of time units a programmed timer is programmed to count before timed contacts change state.
    8·1 answer
  • Write a function to prompt the user to enter the information for one movie (title, release date, mpaa rating and number of stars
    8·1 answer
  • Which of the following is the last step in creating a budget?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!