1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
2 years ago
10

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the

Computers and Technology
1 answer:
puteri [66]2 years ago
6 0

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

You might be interested in
Write code that prints: Ready! userNum ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and af
Vinvika [58]

Answer:

Kindly find the code snippet in the explanation written in kotlin language

Explanation:

fun main(args: Array<String>) {

   var num:Int

   println("Enter a num")

    num= Integer.valueOf(readLine())

   for(i in num downTo 1){

       if(i==num){

           print("Ready!")

           print(" ")

       }

       print(i)

       print(" ")

       if(i==1){

           print(" ")

           print("Go!")

       }

   }

}

This function too can also work

fun numTo(num:Int){

   if (num>0) for(i in num downTo 1) print("$i ")

   println("Go!")

8 0
3 years ago
What are the types of hypervisiors ?
melomori [17]
<h2>Answer:</h2>

The correct options are

  • Bare metal and hosted
  • Memory and operating system based  Virtual and physicality
<h2>Explanation:</h2>

There are two types of hypervisors:

Type 1 hypervisor are those hypervisors that run directly on the system hardware such as a “bare metal” embedded hypervisor,

Similarly

Type 2 hypervisor is the kind of hypervisors that runs on a host operating system that provides virtualization services, such as I/O device support and memory management.


6 0
3 years ago
Read 2 more answers
If your pulse is higher than your Target Heart Rate during exercise, what should you do?
vodomira [7]
If your heart rate exceeds 185 beats per minute during exercise, it is dangerous for you. Your target heart rate zone is the range of heart rate that you should aim for if you want to become physically fit. It is calculated as 60 to 80 percent of your maximum heart rate.
8 0
2 years ago
Read 2 more answers
Do Violent Video Games Make People More violent in Real Life ?
vova2212 [387]
To be honest, NO. Its just a videogame but i see what you are saying...
4 0
3 years ago
If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
gayaneshka [121]

Answer:

The correct answer to the following question will be "Server role migration".

Explanation:

  • A process of moving data from one data to the next. Security concerns are the causes behind the system relocation, the hardware is also being changed and several other influences.
  • With this, you are setting up a new server, either virtual or physical, running a new version of Windows (Windows Server) and then moving your positions and facilities to the newly constructed Windows Server Virtual Machine/Physical.

Therefore, it's the right answer.

3 0
3 years ago
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Which activity constitutes legal computer activity?
    12·1 answer
  • What can a person do to help increase their credit score? AUse only a small percentage of your credit limit. BResearch student l
    8·1 answer
  • What do you call a set of programs?
    7·1 answer
  • In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the
    15·1 answer
  • Please code this in c++
    10·1 answer
  • Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the functio
    15·1 answer
  • Please need help.... The system development process is called a cycle. Which of the following may be an ongoing process which su
    6·1 answer
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!