1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
2 years ago
10

For our computer club in school, we are making a discord server and seeing who can get the most members. I am making an Anime Se

rver, so if you would like to join it add your username down below. Although if you do not want to, then don't answer this question and waste my points.
Computers and Technology
1 answer:
Gwar [14]2 years ago
5 0

Answer:

misteragua#1874

Explanation:

You might be interested in
Which of the following is true about ethical issues in graphic design?
Basile [38]

Answer: The Answer Is B

Explanation:

I Did It On Edge

3 0
2 years ago
Read 2 more answers
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
What are comments meant to do?
docker41 [41]
Comment<span> (computer programming) ... In computer programming, a </span>comment<span> is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters.</span>
8 0
3 years ago
Some web and mobile applications allow users to share pictures and videos, as well as chat and message. True False
pishuonlain [190]
True ever heard of Instagram or snap chat
8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the two computers A and B with the clock cycle times 100 ps and 150 ps respectively for some program. The number of cyc
    5·2 answers
  • Subscribe to epic beast brothers thank you
    7·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • Can web sites contain copyright material? <br> Yes <br> No
    10·2 answers
  • Create and Provide complete program that includes a comments header with your name, course, section and other program details an
    9·1 answer
  • How to convert 23.125 to binary (Hex) using the double - precision representation
    6·1 answer
  • Write 4 types of viruses , explain them briefly.
    7·1 answer
  • What are the odds that you find someone you know in person on here
    5·1 answer
  • Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
    7·2 answers
  • Thabo has a small barber shop and he uses Microsoft applications to keep track of his stock and to create posters for advertisin
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!