1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
15

Method does not override or implement a method from a supertype

Computers and Technology
1 answer:
muminat3 years ago
4 0
Where is the question? if there was a question i could potentially help you.
You might be interested in
What are the information ethics associated with IP
Naily [24]

Answer:

The IP stands for intellectual property. And the information ethics related to the IP are the transaction privacy, piracy and the privacy for the ease and giveaways, investigation, namelessness. The trade details must be kept private, and not disclosed to anybody, and the piracy is never allowed. Also, the privacy of all sorts must be ensured for ease and giveaways, surveillance, and confidentiality.

Explanation:

Please check the answer section.

3 0
4 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
What is an Operating System write its types and describe in short​
Simora [160]

Answer:

An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... Other specialized classes of operating systems (special-purpose operating systems), such as embedded and real-time systems, exist for many applications.

Explanation:

hope it helps

4 0
3 years ago
How many different ways are there to save a document?<br><br> 1<br> 2<br> 3<br> 4
wolverine [178]
I’m pretty sure there are 2.

SAVE AS and SAVE
7 0
3 years ago
Read 2 more answers
BRAINLY, WHY CAN'T I COMMENT ANYMORE(what did I do to deserve this)
Crank

Answer:

Did you write something inappropriate

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
    14·2 answers
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • John just opened a savings account and wants to maximize the account of interest you earn which of the following actions would e
    13·1 answer
  • Question 7 of 10
    13·1 answer
  • Randy earn $22 per hour. This is an example of
    11·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • What is the process that creates a shortcut on your taskbar?
    14·2 answers
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • The ________ marker is the character that marks the end of a file and is automatically written when the file is closed.
    6·1 answer
  • Question 1 of 10
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!