1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sav [38]
3 years ago
14

Try to crack the code:

Computers and Technology
1 answer:
ololo11 [35]3 years ago
3 0

Answer:001101110010010100011011010110010011100100100000001100100100110001000010001101100100010100100000001101100100100001010001010101001101001010

Explanation:

i copied

You might be interested in
Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
SVEN [57.7K]

Answer:

True

Explanation:

Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False

Authorization is a set of rights defined for a subject and an object.

Authorization is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification.

4 0
3 years ago
What describes the current cloud landscape for business?
KonstantinChe [14]

Answer:

Organizations need to change the vast majority of their tasks to the cloud to stay competitive describes the current Cloud landscape for business

Explanation:

All cloud computing frameworks are effectively open over the web with minimal requirement for actual equipment other than cloud servers at the back end.

5 0
3 years ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
Will Give Brainliest
DENIUS [597]

Answer:

I would think Creativity, but im not sure-

6 0
3 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
Other questions:
  • How do you do these questions? The first two questions could have multiple answers and the third is one answer only.
    7·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Which statement accurately compares the Restart at 1 and Continue Numbering features of Word?
    13·2 answers
  • The blank is the area on your screen where you can access the tab and menu options for word
    5·1 answer
  • 4. What is the simplest way to permanently get rid of an unwanted file?
    12·1 answer
  • First identify the formula to compute the sales in units at various levels of operating income using the contribution margin app
    12·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • Hey plz help, and thanks
    12·2 answers
  • I need solutions to below questions with python code:
    8·1 answer
  • If a pixel displayed on a screen has a red DN of 127, a green DN of 127, and a blue DN of 127, what color is the pixel
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!