1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
12

Complete the sentence.

Computers and Technology
2 answers:
vlabodo [156]3 years ago
5 0

Answer:

Your answer is <u><em>encrypted </em></u>

Explanation:

This will keep your information secure whilst sending it.

This means to:

convert (information or data) into a cipher or code, especially to prevent unauthorized access

So your info is safe

Pls mark brainliest <3

Hope this helps :)

`

`

`

<em>Tori </em>

Artemon [7]3 years ago
4 0

Answer:

encrypted

Explanation:

to prevent others from viewing it

You might be interested in
PLzzzzzz help me!! I will mark brainiest to the one who answers it right!!
jasenka [17]

Answer: abstract algebra

Explanation: start with the algorithm you are using, and phrase it using words that are easily transcribed into computer instructions.

Indent when you are enclosing instructions within a loop or a conditional clause. ...

Avoid words associated with a certain kind of computer language.

4 0
3 years ago
How to drive more website traffic?
lidiya [134]

Hello there,

How to drive more website traffic?

Answer: Advertise

8 0
4 years ago
What is defined as a set of machine-readable instructions that directs a computer's processor to perform specific operations?
maria [59]
An executable, a program.
5 0
4 years ago
You are considering creating a new operating system to compete with the current operating systems on the market. You must decide
Misha Larkins [42]

Answer:

well for one you need to find the correct platform by comparing them and deciding which ones are the best and start eliminating each one until you have the one you want , then if you are competing make sure you have high quality ratings, graphics make sure there are no bugs or ways to hack it but also make sure that it stays within your budget, and i would target the most active social media group: teens, they spend a lot of time on social media and games so i would target them because they could be persuaded quite easily. and i would make sure the performance is great, the preference would be something that would appeal to the teens, and the price would be something that they could afford but somewhat on the pricey side so that i have enough money to keep the program running.

Explanation:

5 0
3 years ago
Define token. Give examples of 5 tokens in any programming language​
dimaraw [331]

<u>Tokens and its examples:</u>

Token is data type and it is behavior or categorized types. Basically most of programing language will have all five tokens data types and they are.

  • Operators.
  • Constants
  • Reserve words
  • Separators
  • Identifiers

Operators: - such as mathematic operations such as example: - “+”,”-“

Constants: - which used with CONST in vb.net or #define in c programming language, such as example: - 400,200.

Reserved words:- if , then are all used for if condition where if and then are reserved used in programming language for specific purpose.

Separators: - it used with write a procedure or function, in c languages “()” or “()” in vb.net sub and end sub.

Identifiers: - end user to define variable with data type class and store the value in the programming languages, such as amt = 0, rate=10.5.

8 0
3 years ago
Other questions:
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • The program needs a Frisbee Golfer class.
    15·1 answer
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • Please check my answer! (Java)
    8·1 answer
  • The term "stop" is used to refer to a change in aperture. If I change my f stop setting from f/8 to f/11, it's one-stop up which
    9·1 answer
  • Question 4 (Worth 5 points)
    14·2 answers
  • True or false: It can take some time for the labs to load once you click “start lab.”
    7·1 answer
  • Give the an example of the following .<br>a.)typing software<br>​
    10·2 answers
  • This was the template given for my assignment: class Login:
    14·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!