1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
9

Which type of list should be used if the items in the list need to be in a specific order?

Computers and Technology
1 answer:
sp2606 [1]3 years ago
7 0

Answer:

chronological

Explanation:

if your list is in chronological order that means it will be in the exact specific order in which you need it to be

You might be interested in
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
Primary memory consists of the various devices that are able to store data and programs even when the power is off. true or fals
balu736 [363]

Answer: I think its true but I'm not like 100% sure sorry

Explanation: i dont know just seems right

6 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names
mote1985 [20]

Complete Question:

Which statement is true? Group of answer choices

A. Variables cannot be assigned and declared in the same statement

B.  Variable names must contain at least one dollar sign

C. Variable names can be no more than 8 characters long

D.  It is incorrect to initialize a string variable with a number

Answer:

D. It is incorrect to initialize a string variable with a number

Explanation:

  1. Options A-C are not correct
  2. Variables can be declared and assigned values on same statement like this int a =5;
  3. Variable names must not contain the dollar sign as this declaration int num =0; is legal without a dollar sign
  4. Variable names are not restricted to 8 characters long they can be longer
  5. In option D if you declare a variable of a particular type, you must assign a value of that type for example int s ="John" is wrong
3 0
3 years ago
In this activity, you will create a Portable Document Format (PDF) version of a photography career résumé. You will include all
Troyanec [42]

Answer:

Use Adobe Acrobat or another software that enables you to create a PDF.

Explanation:

Download Adobe Acrobat from the official website.

Once you've installed the software, follow the instructions of your assignment. A good example of a resume for a photography career can be found through a web search, any should do.

Once you've opened up the program, you'll find the tools in the toolbar to help you organize the resume however you'd like it to look. It doesn't matter how you structure the resume, what matters is that you include all of the necessary information asked of you for your assignment.

You can look up important details that should be included in your resume online through a web search.

I hope this helps! And good luck!

4 0
2 years ago
Other questions:
  • Data bars describe a graphic element that
    9·2 answers
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (C
    14·1 answer
  • Every chart has a corresponding ____ that contains the numerical data displayed by the chart.
    6·1 answer
  • Which function returns a valid value without any arguments?
    13·2 answers
  • If you had the choice to pick one car in the world for free.. what car would you
    10·1 answer
  • What is the function of a slide transition in a presentation program? A. It enables you to change the presentation layouts. B. I
    15·1 answer
  • Why has the Personal Software Process not been widely adopted by software industry?
    9·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • ASAP PLEASE the online research you did to describe how Senet is related to the culture and historical period when it was create
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!