1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
2 years ago
15

Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information

to be kept secret.
a. True
b. False
Computers and Technology
1 answer:
Rudiy272 years ago
5 0

Answer:

true

Explanation:

the answer is true dude

You might be interested in
The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
mylen [45]
6 cells because you have to drag and it becomes six cells .

8 0
4 years ago
Read 2 more answers
A business-to-consumer (B2C) website tracks the items you place in a shopping cart using _____. Group of answer choices the Tran
steposvetlana [31]

Answer:

The answer is "cookies".

Explanation:

The B2C websites refer to companies, that directly sell services and products without the need for a distributor. It refers to the online merchants, which provide the offer on the products and services via the internet to customers.  It uses the cookie in a small amount of data within the browser memory for the process and once you visit those websites on the internet, OS transfer cookies for your internet browser. It includes an ID as well as its URL, and the incorrect choice can be defined as follows:

  • The TLS protocol is the wrong choice because it is used in the privacy and data security.
  • The crawlers are also a wrong choice because it is used in automatically searches.
  • An electronic wallet is used to store your money, that's why it is wrong.
7 0
4 years ago
Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
QveST [7]

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

8 0
3 years ago
What is wrong with each of the following code segments? int[] values; for (int i = 0; i &lt; values.length; i++) { values[i] = i
tino4ka555 [31]

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"

7 0
3 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
Other questions:
  • What are the five steps of ethical hacking?
    15·1 answer
  • If a method writes to a file it should start out like (fill out the blank, what should you write after the parameters in the met
    12·1 answer
  • Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
    9·1 answer
  • The speed of sound depends on the material the sound is passing through. Below is the approximate speed of sound (in feet per se
    9·1 answer
  • Please help me out with my essay
    15·1 answer
  • How do i add a header or footer to powerpoint presentation
    15·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Ria and her team ....................... they will win. *
    8·1 answer
  • You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Altho
    10·1 answer
  • The purpose of a flowchart is similar to the purpose of pseudocode.<br> True<br> False
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!