1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka57 [31]
2 years ago
13

Why is this happening when I already uploaded files to my drive?

Computers and Technology
1 answer:
lara31 [8.8K]2 years ago
7 0

Answer:

u have to upload it to your drive first

Explanation:

You might be interested in
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
9 months ago
When making programmed decisions, the information needed to make this decision is __________, and the problem is highly structur
pentagon [3]

Answer:

readily available

Explanation:

The information needed to make this decision is readily available. That is because such decisions have been made countless times that strict guidelines have been created to handle any similar future decisions. These strict guidelines are organized as a sequence of events that must be followed accordingly and are always available for when the situation arises. Examples of this would be "What to do when a machine breaks?" or "What constitutes firing an employee?"

7 0
3 years ago
A timestamp is three numbers: a number of hours, minutes and seconds. Given two timestamps, calculate how many seconds is betwee
Sonja [21]

hhd fyi ou dfi gd sdi bvb s ujj gr TX cfg y CD vi if dnainfo unlocks Toronto Yazidi

7 0
2 years ago
Write the definition of a class simple. the class has no constructors , methods or instance variables .
Mkey [24]
One is of type int
called hours, initialized to 12, another is of type boolean called
isTicking, initialized to true, and the last one is of type Integer
called diff, initialized to 5.
6 0
3 years ago
HELP ASAP!!! Prompt <br> What is word processing?
mina [271]
Answer:

Word processing refers generally to the creation, editing, formatting, storage, and output of both printed and online or electronic documents.
7 0
2 years ago
Other questions:
  • Explain the concepts o f polymorphism, Encapsulation, Inheritance in detail with suitable examples?
    11·1 answer
  • Where is the worlds biggest cookie​
    7·2 answers
  • Why is population composition by age important give reason​
    13·1 answer
  • Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
    10·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • What is the main difference between project tasks and client support tickets?
    11·1 answer
  • Every command or instruction is called
    8·2 answers
  • 5.
    9·1 answer
  • You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exce
    13·1 answer
  • What is phishing?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!