1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
15

Unlike bar codes and other systems, _____ devices do not have to be in contact with the scanner to be read.

Computers and Technology
1 answer:
UNO [17]3 years ago
7 0

Answer:

radio frequency identification

Explanation:

You might be interested in
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
What is a good principle to implement when you find yourself attempting to
Maurinko [17]

its less is more A

to much could make it really bad

5 0
4 years ago
What is the protocol? What does it do? What layer of the OSI Model does it support?
melomori [17]

Answer:

Protocol: It is a set of rules that govern communication over electronic devices. It is bridge between two devices to communicate with each other. All layers of  OSI model support some protocol features of communication between devices over internet.

Explanation:

What is the Protocol

A protocol is a set of rules that govern communication over electronic devices that how to communicate with each other. These sets of rules include how to send data, what type of data may be transmitted, and how to receive the data and how to confirm that, data has been transmitted successfully.

You can think about protocol as a spoken language between two people. Therefore, people can understand their language easily if both know its rules and vocabulary. That means, if both people can speak with each other in the same language then they can communicate effectively with each other.

Similarly, if two devices support the same protocol, regardless of the type of device or manufacturers, they can communicate with each other effectively. For example, an android device can send email to an iPhone device using a standard mail protocol.

Today different Protocols exist for several different applications. For example wired networking (e.g. Ethernet), wireless networking (e.g. 802.11ac) and internet communication (e.g. IP).

The Internet protocol contains dozens of protocol which is used for transmitting data over the Internet. The protocol may be broken into four categories.

1. Link layer

2. Internet layer

3. Transport layer

4. Application layer

<u>OSI Model and Its Layers</u>

The Open System Interconnection (OSI) model is a conceptual model that is created by the International Organization for Standardization (ISO) which uses a standard protocol to enable communication between devices. In short, the OSI model provides a standard of communication between different computer systems. It has 7 layers, each layer has its own functionality as described below:

  1. Physical layer: Transmits raw bitstream over the physical medium
  2. Data link layer: Define the format of data on the network
  3. Network layer: Decide which physical path the data will take
  4. Transport layer: Transmit data using transmission protocols including UDP and TCP
  5. Session layer: Maintains connections and is responsible for controlling sessions and ports
  6. Presentation layer: Ensure that data is in a usable format and is where data encryption occur
  7. Application layer: Human-computer-interaction layer, where the application can access the network services

<u></u>

3 0
3 years ago
If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, which formula is correct?
Mama L [17]

If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

<h3>What is Excel Formula?</h3>

In regards to Microsoft Excel, a formula is seen as a kind of an expression that tends to function on values that can be found within a range of cells.

Note that these formulas are said to often return a result, even if  it is an error. Excel formulas helps a person to carry out calculations such as addition, subtraction, and others.

Thus, If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

Learn more about Excel formula from

brainly.com/question/27927845

#SPJ1

7 0
2 years ago
(a) List 5 keys we can type with our left hand fingers
ehidna [41]

Answer:

A) <em><u>a,s,d,f, and either g or caps lock</u></em>

B) <u><em>l,k,j,h, and, ;</em></u>

Explanation:

3 0
3 years ago
Other questions:
  • A ________ describes the data and relationships that will be stored in a database.
    10·1 answer
  • What is a form of programming where multiple tasks can be carried out at the same time?
    10·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • ___ allow users to select controls by keyboard shortcuts. (Points : 3) Alternative keys
    13·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • In the scenario below, decide whether you should upgrade the computer or replace it. You’ve been working on your existing laptop
    12·1 answer
  • Select each of the tasks that you could complete using a word processor.
    5·2 answers
  • Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skill
    14·1 answer
  • Relational operators allow you to ________ numbers
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!