1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
2 years ago
10

Question 1

Computers and Technology
2 answers:
Julli [10]2 years ago
8 0
Check out the comments i will post it there
Ivanshal [37]2 years ago
3 0

Answer:

Q1. B

Q2. D

Explanation:

You might be interested in
The ____ contains methods that allow you to set physical properties such as height and width, as well as methods that allow you
maksim [4K]

Answer:

container class.

Explanation:

The container class contains methods that allow you to set physical properties such as height and width, as well as methods that allow you to add the appropriate components to a container.

3 0
3 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Components of an operating system include process, memory, and file management. What is another component of an operating system
Ksivusya [100]
Those are all the components of an operating system

8 0
3 years ago
Read 2 more answers
GUYS!
saul85 [17]

Attached is the answer, please look.

3 0
3 years ago
Write a recursive function, displayFiles, that expects a pathname as an argument. The path name can be either the name of a file
Virty [35]

The following code will be used to write a recursive function and display files

<u>Explanation:</u>

#Import required packages

import os

#Define recursive function

#displayFiles() has a single argument

#which may be either pathname or filename

def displayFiles(pathname):

   #if the given argument is pathname for directory

   if (os.path.isdir(pathname)):

       #open the directory

       for item in os.listdir(pathname):

           #append items in the list

           newItem = os.path.join(pathname, item)

           #print each filename

           #call the function recursively

           displayFiles(newItem)    

   #otherwise if the pathname

   #is filename

   else:

       #set the pathname to filename

       filename=pathname

       baseFile = os.path.basename(filename)

       print("File Name: ", baseFile)

       #open the file in read mode

       with open(filename, "r") as file:

           print("Content:")

           #display the contents of the file

           for line in file:

               #print line

               print(line)

           print()

8 0
3 years ago
Other questions:
  • What is the subjects under artificial intelligence ?​
    15·1 answer
  • given:an int variable k,an int array currentMembers that has been declared and initialized,an int variable memberID that has bee
    5·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Chelsea is writing a paper about the value of running every day. She wrote this thesis statement:
    10·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • How to make a computer
    14·2 answers
  • Free point giveaway pt.10 and brainliest to first answer
    13·2 answers
  • What is shotgun microphone?
    7·1 answer
  • Which database can be used to find studies related to allied health sciences?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!