1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
2 years ago
14

Select the correct answer from the drop-down menu.

Computers and Technology
1 answer:
Eva8 [605]2 years ago
3 0

Answer:

1. diagraph

2.analog

maybe

You might be interested in
Which of the following can be used to get an integer value from the keyboard?
seraphim [82]

Answer:

Integer.parseInt( stringVariable );

Explanation:

This function is used to convert the string into integer in java .Following are the program that convert the string into integer in java .

public class Main

{

public static void main(String[] args)  // main method

{

 String num = "1056"; // string variable

int res = Integer.parseInt(num);  //convert into integer  

System.out.println(res); // display result

}

}

Output:1056

Therefore the correct answer is:Integer.parseInt( stringVariable );

6 0
3 years ago
Which sns gets its names from one of its unique features
Komok [63]

Answer:

no

Explanation:

3 0
3 years ago
What is a many-to many types of correspondence?
Ann [662]

Answer:

We have many types of correspondences. There are internal correspondences, external correspondences, sales correspondences, and personalized correspondences. By many to many correspondences we mean, a lot of people correspond with a lot many people from another department, company or market, or any set of people in fact. An internal correspondences, sales correspondences, personalized correspondences or external correspondences can be of many to many types, and as well as of others like one to one, many to one and so on.

Explanation:

Please check the answer.

5 0
3 years ago
What is the full form of GUI​
Nonamiya [84]

Answer:

The graphical user interface (GUI /dʒiːjuːˈaɪ/ jee-you-eye or /ˈɡuːi/) is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation.

4 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • Which shortcut key aligns text to the center of a page?
    13·2 answers
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    8·1 answer
  • According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
    5·1 answer
  • When using the Internet, it is important to know the validity of web page you are using. How can you know if the information is
    5·1 answer
  • let's imagine you're searching for hotels in searching chicago, what should you search for in order to get the most relevant res
    11·1 answer
  • How do I type over Images (photo posted ​
    12·2 answers
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • What should be entered to make the loop print
    6·1 answer
  • How does social network use message to entertain?
    14·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!