1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
10

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the

Computers and Technology
1 answer:
puteri [66]3 years ago
6 0

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

You might be interested in
The idea behind ____ is that the peripheral can simply be plugged in and turned on, and that the computer should dynamically rec
Eva8 [605]

Answer:

this is plug and play

Explanation:

plug and play or PnP is a standard that has been in use commonly since around the beginning of the millenia. pnp devices usually work without needing any drivers manually installed, they use generic ones included with the operating system most of the time.

8 0
4 years ago
Which of the following is considered a white collar crime?
irinina [24]

Answer:

The answer would be C if I am correct

Explanation:

The reason being is because white collar crimes are non-violent and usually are finance related and involves business or government things, so money laundering would make sense, i hope this helps

5 0
3 years ago
In order to communicate between devices inside a computer?
labwork [276]
Seems to be a CPU, central processing unit

Handles transactions between on-board memory, as well as I/O (input/output) devices.
4 0
3 years ago
The permissions of a file in a Linux system are split into three sets of three permissions: read, write, and execute for the own
Reptile [31]

Answer:

Explanation:

def octal_to_string(octal):

   result = ''

   value_letters = [(4, 'r'), (2, 'w'), (1, 'x')]

   for c in [int(n) for n in str(octal)]:

       for value, letter in value_letters:

           if c >= value:

               result += letter

               c -= value

           else:

               result += '-'

   return result

print(octal_to_string(755))

print(octal_to_string(644))

print(octal_to_string(750))

print(octal_to_string(600))

**************************************************

7 0
4 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Other questions:
  • Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, h
    13·1 answer
  • A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 950
    8·2 answers
  • What does it mean for a design to be content driven
    12·1 answer
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • The numbering system we commonly use is called the decimal numbering system because it uses ________ symbols to represent all po
    5·1 answer
  • Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
    8·1 answer
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • What method do phishing and spoofing scammers use
    12·1 answer
  • Complete the AscendingAndDescending application so that it asks a user to enter three integers. Display them in ascending and de
    7·1 answer
  • True or false: Quality score is an algorithm that scores each of your search ads on spelling and grammar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!