1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
2 years ago
5

A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the

amount of material that can be analyzed via cryptanalysis to break the cipher.
Computers and Technology
1 answer:
taurus [48]2 years ago
3 0

Answer:

Computer Security

Explanation:

if referring to only to a computer, then it can be considered secure when the computer does what is is supposed to do and only what it is supposed to do, but in more modern times the definition has shifted from the computer to the information being processed

You might be interested in
For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
xxMikexx [17]

Answer:

72.80 % more energy will be consumed.

Explanation:

First of all, let us have a look at the formula of energy for a processor.

E = CV^2f

Where, E is the energy

C is the capacitance

V is the voltage and

f is the clock rate.

Let E_1 be the energy of older processor.

C_1 be the capacitance of older processor.

V_1 be the voltage of older processor

f_1 be the capacitance of older processor

So, E_1 = C_1V_1^2f_1 ....... (1)

and

Let E_2 be the energy of newer processor.

C_2 be the capacitance of newer processor.

V_2 be the voltage of newer processor

f_2 be the capacitance of newer processor

E_2 = C_2V_2^2f_2 ....... (2)

Dividing equation (2) with equation (1):

\dfrac{E_2}{E_1} = \dfrac{C_2V_2^2f_2}{C_1V_1^2f_1}

As per given statement:

C_1=C_2

V_2=1.2\times V_1

f_2=1.2\times f_1

Putting the values above:

\dfrac{E_2}{E_1} = \dfrac{C_1\times (1.2V_1)^2\times 1.2f_1}{C_1V_1^2f_1}\\\Rightarrow \dfrac{E_2}{E_1} = \dfrac{(1.2)^2\times 1.2}{1}\\\Rightarrow \dfrac{E_2}{E_1} = 1.728\\\Rightarrow \bold{E_2 = 1.728 \times E_1}

Energy consumed by newer processor is <em>1.728 </em>times the energy consumed by older processor.

OR

<em>72.80 %</em> more energy will be consumed by the newer processor.

4 0
3 years ago
Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
Umnica [9.8K]

Answer:

Virtual team

Explanation:

A virtual team is also known as a remote team, where every member of the team is working from different geographic locations. Usually, the communication channel is through voice/video conferencing or email.

Each member of the team is given unique roles and these roles are delivered optimally within the specified time frame.

For instance, Malcolm does not meet with other members of the team, yet they are working on a project (a smartphone app to track traffic patterns). Following standards that would have applied if they were working at a specific location.

Thanks to Information and Communication Technology (ICT), virtual jobs are on the increase, providing jobs to a lot of people not minding their geographic location.

7 0
3 years ago
Pharming involves redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web brow
Anna35 [415]

Answer:

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.          

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
  • Pharming is done by hackers in order to steal sensitive data from a person's computer.
8 0
2 years ago
Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
Savatey [412]
One step is to right click on the word to add it to her personal dictionary. or, <span><span>Press F7. Word starts the spelling and grammar checking utility. </span><span>Make corrections, as appropriate, when prompted.
</span></span>

However, one can create a macro that would do the conversions :

1) Identify a list of words whose spelling you want to convert.2) Turn on the macro recorder. 3) Use the Replace feature to replace the spellings.4) Turn off the macro recorder.

The macro will do a conversion from one to the other. Later, as we have more words that need to be automatically replaced, we can just edit the macro and add those words.

8 0
3 years ago
Consider the two computers A and B with the clock cycle times 100 ps and 150 ps respectively for some program. The number of cyc
Kipish [7]

Answer:

Option d) B is 1.33 times faster than A

Given:

Clock time, t_{A} = 100 ps

t_{A} = 150 ps

No. of cycles per instructions,  n_{A} = 2.0

n_{B} = 1.0

Solution:

Let I be the no. of instructions for the program.

CPU clock cycle, f_{A} = 2.0 I

CPU clock cycle, f_{B} = 1.0 I

Now,

CPU time for each can be calculated as:

CPU time, T = CPU clock cycle\times clock time

T_{A} = f_{A}\times t_{A} = 2.0 I\times 100 = 200 I ps

T_{B} = f_{B}\times t_{B} = 1.0 I\times 100 = 150 I ps

Thus B is faster than A

Now,

\frac{Performance of A}{Performance of B} = \frac{T_{A}}{T_{B}}

\frac{Performance of A}{Performance of B} = \frac{200}{150}

Performance of B is 1.33 times that of A

7 0
2 years ago
Read 2 more answers
Other questions:
  • 0.005098 megaliters to liters. Show your work.
    11·1 answer
  • What is the block of text at the bottom of the page called?
    7·1 answer
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • What does the acronym GIF stand for? Graphics Interface Format Graphics Interchange Format Going Into Files Gathering Informatio
    12·2 answers
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • Credence is a student in college.
    13·2 answers
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
  • Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!