1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
5

During boom times, which of the

Computers and Technology
1 answer:
pashok25 [27]3 years ago
3 0
I think the answer is D.
You might be interested in
A keyboard would be considered _____. Select 2 options.
Digiron [165]

Answer:

What are the 2 options?

Explanation:

7 0
3 years ago
Read 2 more answers
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
Tomtit [17]

Answer:

B.) Open Office Impress

Explanation:

The options are:

A.) Open Office Writer

B.) Open Office Impress

C.) an outline

D.) photographs

Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.

7 0
3 years ago
Read 2 more answers
The BIOS feature that enables a hard drive to read or write several sectors at a time is called what?
lukranit [14]

The BIOS feature that enables a hard drive to read or write several sectors at a time is called IDE block mode

Explanation:

IDE block mode setting speeds up IDE drivers when enabled by allowing multiple sectors to read or write operations. This BIOS feature rushes up hard disk drive passage by transferring many divisions of data per interrupt rather than using the normal single-sector transfer mode.

This mode of transfer is known as block transfers. When block transfers are enabled, depends on the IDE controller, nearly 64 KB of data can be transferred per interrupt.

4 0
4 years ago
Which two men developed the steam engine?
Whitepunk [10]

Answer:

Thomas Savery and Edward Somerset.

Explanation:

6 0
3 years ago
Other questions:
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • Somehow I lost 1000 points!!! Does anyone know what happened? Is it possible that I was hacked? ​
    7·2 answers
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res
    11·2 answers
  • The breastbone or ________________ extends down the chest.
    5·1 answer
  • State the Limitations of the first generation of computers​
    8·1 answer
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!