1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
2 years ago
7

12 POINTS!!!!

Computers and Technology
1 answer:
Klio2033 [76]2 years ago
7 0

Answer:

1) daily

2)37%

Explanation:

1) regularly implies it

You might be interested in
Ses
jekas [21]

Answer:

Amoung us

Explanation:

When the imposter is sus

8 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Which of the following costs should be considered when providing your own Web server instead of using a cloud service provider o
jenyasd209 [6]

Answer:

A hardware and software support technician

Explanation:

If you provide your own web server, you also need <em>hardware and software support technicians</em> who will configure, manage, maintain and handle failures.

<em>A Web development team</em> is needed either you own your server or you are on cloud.

<em>The flexible subscription fee that varies upon the resources used </em>is an option in cloud.

<em>The market</em> does not response directly to the decision of server hosting

8 0
2 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
An incident response plan should be created be for a software system is released for use.
Nat2105 [25]
The answer is choice “a. True”.
8 0
1 year ago
Other questions:
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • Which of the file names below follows standard file naming convention
    13·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 T
    15·1 answer
  • 14. The Internet may best be compared to a/an
    13·2 answers
  • Name two ways you can identify the pid number of the login shell.
    13·1 answer
  • Hi there! I just started my beginner computer science class and I was wondering if anyone wants to help with an assignment i'm h
    15·1 answer
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Complete the concept map on computer as outlined below​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!