1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
12

I do not understand what the are asking in csys 1.3.6

Computers and Technology
1 answer:
Amiraneli [1.4K]3 years ago
6 0

Can i see the note????

You might be interested in
In a virtual memory system, each process must have its own page table.(True or False?)
Anna71 [15]

Answer: True

Explanation:

 Virtual memory is the secondary storage memory and this type of memory are addressed as main part of the memory.

When the virtual memory copying in the physical memory then, at that time the operating system divide the memory into the file page with the address and definite size number. Then, the each page are store in a disk.

When this page are required then, the operating system copy from disk to main memory and then, the virtual address are converted into the  real address.

6 0
3 years ago
ENG103 DISCUSSION BOARD 5
ehidna [41]
Plagiarism is a crime, flat out. It is unethical and immoral to copy, verbatim, another persons work and claim it as your own, especially for scholastic uses. In order to avoid plagiarism, it is important that we give accurate references and paraphrase, rather that copy and paste information. It is important to consider the widespread effect of plagiarism. It effects all involved: The student, the owner of the information, the instructor, and even the site from which the information was stolen. Use the proper channels and be honest when completing assignments goes a long way. We must do what we can to prevent plagiarism, starting with ourselves and our own research. <span />
5 0
3 years ago
Required skills,training,education for dentist
AlekseyPX

Answer:

Education-Bachelor's degree prior to admission to dental school; doctoral degree in dental medicine or dental surgery; some dental specializations require completion of a residency

Skills- Communication skills. Dentists must have excellent communication skills, Detail oriented, Dexterity, Leadership skills, Organizational skills, Patience, Physical stamina, Problem-solving skills.

Explanation:

7 0
3 years ago
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
3 years ago
What is the purpose of the Chart feature in Word?
Burka [1]

Answer:

i think its the second one

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the most important part of the course that you have learned about so far?
    11·2 answers
  • Simplify (6x+6)+(-3-4x) please hurry!!!!!
    6·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • Write a program that prompts the user to enter a number then counts the number of odd numbers and even numbers the user enter. T
    15·1 answer
  • Why concurrency control is needed in transaction.
    5·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
  • What program command saves a copy of a file under a different name
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!