1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
2 years ago
5

What number is represented as a binary code of 101110

Computers and Technology
2 answers:
kherson [118]2 years ago
7 0
46

46 in binary is 101110
mariarad [96]2 years ago
4 0

Answer:

46 i think

Explanation:

sorry if thats wrong

You might be interested in
Which of the following is one way a corporation can raise money?
Vladimir [108]
Selling stock on the stock market
4 0
3 years ago
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
Len [333]

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

4 0
3 years ago
How do access the dictionary and thesaurus in Word?
horrorfan [7]
Click the FILE tab. Click Options in the list on the left side of the screen. On the WordOptions dialog box, click Proofing in the list of options on the left. 
3 0
3 years ago
Read 2 more answers
When the POST is complete,t he operating systems is loaded into?
Lina20 [59]
<span>After the POST is successfully completed the CPU searches Storage devices for special files that indicate the beginning of the OS and then loads it into memory. </span>

<span><span>The sequence in which the storage devices are searched is part of the configuration set-up stored in BIOS. 

</span><span>Once the Operating System (OS) is located, the CPU copies what’s called the 'boot record' from the OS into DRAM. 

</span><span>Control is then passed to the 'boot record' in DRAM, which then continues loading the rest of the OS. 

</span><span>This process continues until the OS load is completed. 

</span><span>When the OS load is completed the Desktop appears in the display and waits for you, the user, to tell it what you want it to do.</span></span>
4 0
3 years ago
Which outcome would be a good use for the SUM function? Check all that apply.
Stolb23 [73]

Answer:

The answers are 1,2,5,and 6.

Explanation:

5 0
3 years ago
Other questions:
  • As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 di
    15·1 answer
  • Give two reasons to break up
    11·2 answers
  • How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
    7·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Which actions changed the look of the following word?
    8·2 answers
  • How do i get the schools admin password for the good wifi
    10·2 answers
  • How do i work on code with someone else? i use visual studio code. me and a friend wanna make a game together with code. how do
    8·1 answer
  • Draw a flowchart diagram for a program that displays numbers 1 to 20
    12·1 answer
  • 15. It is the process of capturing data or translating information to recording format
    12·1 answer
  • Congress are smart becuase.....
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!