Which of the following statements describe encryption? Check all of the boxes that apply.

It turns data into cipher text.

It makes data unreadable without a decryption key.

It makes using a computer difficult.

It helps secure data.

It shares files with other computers.

Answers

Answer 1

Answer:

It turns data into cipher text, It makes data unreadable without a decryption key, It helps secure data.

Explanation:

I hope this helps

Answer 2

Answer:
A)

B)

D)

Explanation:

Edge 2022


Related Questions

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Answers

Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.

Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.

It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.

See full question below

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Select an answer:

A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.

B. He connected to an outside data source.

C. He dragged and dropped the file into Tableau.

He duplicated the data in Tableau.

Learn more from

https://brainly.com/question/22908883

Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk

Answers

Answer:

Design a web page

Explanation:

It is easier html is a very easy language to learn css it should take ou about a week for a solid website

If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?

Answers

Answer:

Explanation:

crm

Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)

Answers

The  function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:

def first_letter(x):

   if len(x) < 25:

       for i in x:

           return x[0].upper()

   else:

      return "Your text should be less than 25 characters"

print(first_letter("brainly"))

The code is written in python.

We declared a function named first_letter with the parameter x.

If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.

Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.

Finally, we call the function with a print statement.

The bolded portion of the code are python keywords.

read more: https://brainly.com/question/14603294?referrer=searchResults

What are the main approaches for dealing with deadlock?

Answers

Answer:

Deadlock ignorance

Deadlock prevention

Deadlock avoidance

& Detection and recovery

Hope This Helps!!!

rearrange the following procedures in there proper order. use numbers (1-8) to indicate their order of precedence.
.___________crimp
.___________strip cable end
.___________test
.___________untwist wire ends
.___________trim wires to size
.___________check
.___________arrange wires
.___________attach connector​

Answers

Answer:

6 - crimp

1 - strip cable end

8 - test

2 - untwist wire ends

4 - trim wires to size

7 - check

3 - arrange wires

5 - attach connector​

Explanation:

Step 1. Strip cable by inserting into the stripping tool. Rotate the cable in a smooth and even motion to create a clean cut and pull away towards the end of the wire to remove the sheathing.

Step 2. Untwist wire ends. Separate the twisted wires and straighten them out to easily sort in the right order.

Step 3. Arrange wires. Put the wires in the correct order so they can be properly crimped.

Step 4. Trim wires to size. Use the cutting section of the crimping tool to cut them into an even line.

Step 5. Attach connector. Insert the connector so that each of the small wires fits into the small grooves in the connector.

Step 6. Crimp. Insert the connector in the crimping tool. Squeeze the handles to crimp the connector and secure the wires.

Step 7. Check. Take the connector our of the tool and look at the pins to see that they're all pushed down.

Step 8. Test. Lightly tug at the connector to make sure it's attached to the cable.

Evaluate the expression using stack 14-(6-10)-10

Answers

Answer:

14 -(6-10)-10

14-(-4)-10

18-10

= 8

Which character is midway between the 3rd character from left and 6lh character from rights

a. 2
b. 3 ANS
c. 8
d. Y

Answers

Answer:

D

Explanation:

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

Which of the following is not an artificial intelligent technology?

Speech recognition

Text analytics and NLP

Computer vision

Robotic desktop automation

None of the above

Answers

Robot desktop automation

characteristics of special computers​

Answers

Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!

4.7 Code Practice: Question 1 Please help!

Answers

Whats the question???

Interface elements include but are not limited to:

Question 3 options:

A. Navigational components, containers, interaction design


B. Input controls, navigational components, visual design


C. Input controls, informational components, containers


D. Input controls, informational components, visual design


E. Navigational components, informational components, visual design

Answers

Interface elements include but are not limited to: C. Input controls, informational components, containers.

A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.

Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.

In Computer programming, some of the interface elements used include the following:

Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.

Read more: https://brainly.com/question/19341134

Write a program to grade an n-question multiple-choice exam (for n between 5 and 50) and provide feedback about the most frequently missed questions. Your program will take data from the file examdat.txt. The first line of the file contains the number of questions on the exam followed by a space and then an n-character string of the correct answers. Write a function fgets Answers that inputs the answers from an open input file. Each of the lines that follow contain an integer student ID followed by a space and then that stu dent's answers. Function fgets Answers can also be called to input a student's answers. Your program is to produce an output file, report.txt, containing the answer key, each student's ID, and each student's score as a percentage, and then information about how many students missed each question. Here is a short sample input and output files. examdat.txt 5 dbbac 111 dabac 102 dcbde 251 dbbac

Answers

Answer:

I was able to create script however it was not in the correct language, sorry.

Explanation:

By using ONLY the language of C++,

How many times the loop will be executed?

int odd = 1, sum = 2, count = 9;

do {

sum = sum + odd;

odd = odd + 2;

cout >> sum

count = count + 1;

}

while (count < 10)
}


MCQs:

A) 1
B) 2
c) 0
d) 3

Answers

Answer:

0

Explanation:

Answer: Syntax error. So it would be 0.

After correcting syntax it would be 1

Explanation:

Braces never started in beginning but put in the end after while loop

A keyboard would be considered _____. Select 2 options.

an input device

storage

an output device

software

hardware

Answers

Answer:

input devise and hardware

Explanation:

Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the string 'The only impossible journey is the one you never begin.', selection should contain 'possible jou' after your statement executes.

Answers

The statements that slices a substring out of the string quote and puts it into a variable named selection is as follows:

text = "The only impossible journey is the one you never begin."

selection = ""

selection += text[11:23]

print(selection)

The code is written in python.

The string is stored in a variable called text.

The variable selection is declared as an empty string. The purpose is to store our new substring.

The third line of the code is used to cut the string from the 11th index to the 23rd index(excluding the 23rd index) and add it to the declared variable selection.

Finally, we output the variable selection by using the print statement.

The bolded values in the code are python keywords.

read more; https://brainly.com/question/20361395?referrer=searchResults

What are the process of hacking computers

Answers

Answer:

Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.

Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.

Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.

Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.

Explanation:

Have a great day!

2. PJM Bank has a head office based in Bangalore and a large number of branches nationwide. The
headoffice and brances communicate using Internet. Give two features of Internet.

Answers

Answer:

Two features of the internet are that internet is a collection of computers which help in the sharing of information.

Most of the home users of internet make use of cable or phone modem, or a DSL connection in order to connect the internet.

Computers that save all of these web pages are referred to as the web servers.

Explanation:

1. most of the home users of internet make use of cable aur phone modern or a DSL connection in order to conduct the internet .

2. computers that save all of these web pages are referred to as the web servers.

(Hope this helps can I pls have brainlist (crown)☺️)

Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor

Answers

Answer: printer

Explanation:

what is wardrobe in french

Answers

Answer:

garde - grobe

Explanation:

that's all

When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch

Answers

Answer:

Socratic app

Explanation:

it will help you

How can the information from a phr be shared

Answers

Answer:

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. Patients can access their records in a tethered PHR through a secure portal.

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. In some cases, a stand-alone PHR can also accept data from external sources, such as laboratories or providers.

in microsoft word, level 1 is automatically formatted as

Answers

Answer:

Level 1 is the highest or main level of heading, Level 2 is a subheading of Level 1, Level 3 is a subheading of Level 2, and so on through Levels 4 and 5. Headings are covered in Sections 2.26 and 2.27 of the APA Publication Manual, Seventh Edition.

Explanation:

Where to store
ammunition

Answers

In gun shops of course. and in basements

The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects is called operator _____. a. overriding b. overloading c. initializing d. testing

Answers

It should be noted that the process of redefining the functionality of a built-in operator to operate is known as operator overloading.

Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.

Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.

Read related link on:

https://brainly.com/question/25487186

ANY KIND PERSON HERE?
in our new situation. what are the things we already use before but we value more now a days to protect our self from virus, write your answer on space provided. ___1. __________________________ ___2.__________________________ ___3.__________________________ ___4.__________________________ ___5.__________________________​​

Answers

Answer:

1. face mask

2. face shield

3. following the social distance

4. taking a vaccine

5. taking care of ourselves

Explanation:

hope this helps

Answer:

1. Face mask
2. Hand sanitizer
3. Alcohol
4. Drinking vitamins
5. Hand wipes/tissues


Hope this helped:)

Technician A says stepped resistors are made from one or more wire-wound resistors.
Technician B says a common application for this type of resistor is in a blower motor speed
control circuit. Who is correct?
Select one:
O a. Technician A
O b. Technician B
O C. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Your answer is both A & B
I hoped this helped <33

An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?

Answers

There are different ways of management.  To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.

Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.

It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.

Learn more from

https://brainly.com/question/13438921

Detail for the configuration of your laptop and your phone

Answers

Answer:

What do u mean?

Explanation:explanation is...

Other Questions
Which type of macromolecule has the function of storing and transmitting hereditary information or genetic information? Is the following relation a function?X. Y-1. -2. 2. 3 3. 1 6. -2 how do i convert 5/6 into a decimal A local cable TV company charges $4 for older movies and $8 for current movies, plus a monthly fee of $30. In July, Kendra ordered 5 older movies and 3 current movies. True or False: The equation below can be used to solve the problem.c = (5 x 4) + (3 x 8) + 30 PLZZ HELP WILL GIVE BRAIIEST IF YOU SAY ANYTHING JUST TO GET THE POINTS THEN I WILL REPORT YOU TO GET YOU BLOCKEDWrite down 45 affixes (15 each) containing the prefix:Bi -Tri-Quad- a person taking a glucose test is usually told to fast prior to the test. why would fasting be necessary? Read the lines from the poem."So, they teach me the sweet lesson,That the humblest may giveHelp and hope, and in so doing,Learn the truth by which we live;For the heart that freely scattersSimple charities and loves,"Analyze the significance of the lines from the poem. Use information from the poem to support your analysis.My Dovesby Louisa May AlcottOpposite my chamber window,On the sunny roof, at play,High above the city's tumult,Flocks of doves sit day by day.Shining necks and snowy bosoms,Little rosy, tripping feet,Twinkling eyes and fluttering wings,Cooing voices, low and sweet,Graceful games and friendly meetings,Do I daily watch to see.For these happy little neighborsAlways seem at peace to be.On my window-ledge, to lure them,Crumbs of bread I often strew,And, behind the curtain hiding, I would really appreciate it if you actually did this. so this is the assighnment:Directions: Follow the link to learn more about Menelik II and answer the questions below. the link will be linked lol1. What actions helped Menelik II maintain the independence of Ethiopia? 3 points2. Why didnt other African nations take action like Menelik II? 2 points3. If other African nations would have been more proactive, do you think they could have avoided being colonized? Explain your answer. 2 points4. Do you agree with the statement below? Explain. 3 pointsMenelik understood the limits of the possible, kept his objectives clearly in sight, and had an almost unerring eye for the means best suited to attain those objectives.Historians Ronald Oliver and G. N. Sanderson One person can mow a lawn in 30 minutes. A second person requires 45 minutes to mow that lawn. How long will it take the two people, working together, to mow the lawn? PLEASE HELP WILL GIVE BRAINLIEST, THANKS, AND RATE!!!In The Landlady the narrator tells the story from whose viewpoint? (USA test prep)A) The narratorB) Billy WeaverC) The LandladyD) The authorYou can just search The Landlady by Roald Dahl pdf.Any false answers will be reported and taken down. A ball is thrown up into the air. When it gets to the very top,what kind of energy does it have? Software that enables information to be obtained from a computer without the user's knowledge is ____________ Marsha Hansen, the manager of the Flint Plant of the Michigan Company is responsible for all of the plant's costs except her own salary. There are two operating departments within the plant, Departments A and B. Each department has its own manager. There is also a maintenance department that provides services equally to the two operating departments. The following information is available. (on the picture) Departments managers are responsible for the wages and supplies in their department. They are not responsible for their own salary. Building rents, utilities, and maintenance are allocated to each department based on square footage. Required: Complete the responsibility accounting performance reports below that list costs controllable by the manager of Department A, the manager of Department B, and the manager of the Flint plant.I will post the template tooPart 1: 1) The temperature in Chicago is 42F and the temperature inDayton is 19 cooler. What is the temperature in Dayton?A. 25F B. 61F C. 23F D. 58F this layer of the skin is also called the hypodermis because it lies under the dermis Read the passage from The Beginnings of the Maasai.Neiterkob was confused at first. It was one thing for an eruption to send cows flying up into the sky, but it was another problem entirely to get them down to earth again. The wise god knew how to solve the problem. Enkai grew a giant fig tree out on the plains. The tree grew rapidly, and its branches grew so high that they reached up into the heavens. One by one, Enkai sent the cattle walking down branches of the fig tree, all the way down to the roots at the ground. My father and our people accepted the cattle and began to herd them with the sticks that Enkai had given us. Now, the rest of the tribe calls my father the Beginner of the Earth because he mediates between Enkai and our tribe, just as he did when the cattle returned from the sky.What does the passage explain?a natural phenomenona peoples culturethe origin of a peoplethe reason for the weath a line that passes through the point (4, 2) and has the slope of -3/2 11) When sodium metal is subjected to violet light, it causes the photoelectric effect. However, red light does not affectthe sodium. Explain this phenomena. Find the measure of 3.266490116 A family gathered 20 small sea shells from the beach brining the total number of small seashells in their collection to 41.Which equation can be used to find, x, the number of small sea shells in the collection before the 20 were added A:. 20_x =41B:. x- 21 =41C:. x + 20 =41D:. 20x=41 HELPPPPEXCEPT PT TH 20_x UNDER EACHOTHER PLS