PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Answer 1

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]


Related Questions

Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and communication we see today.

A.
True

B.
False

Answers

The answer is A, they were built for work.

This is an Image of the ......... Topology.


The person who got it right ,i will mark hem or her as brainly.​

Answers

Answer:

Bus Topology

Explanation:

[tex]{}[/tex]

Question 7 of 10
What are the three main parts to a slide presentation's structure?
A. Thesis statement, supporting evidence, and concluding quotes
B. Main idea, body, and summary
C. Introduction, body, and conclusion

D. Body, conclusion, and references

Answers

Answer:

A

Explanation:

What does // this mean in your code?

Answers

Floor division

For example:-

11//5=2

Some more :-

[tex]\boxed{\begin{array}{c|c}\sf * &\sf Multiplication \\ \sf ** &\sf Exponention \\ \sf \% &\sf Remainder \\ \end{array}}[/tex]

what are quantum computers and it uses​

Answers

Answer: Quantum computers are machines that use the properties of quantum physics to store data and perform computations

What is this on G00gel Documents , how do I fix it?

Answers

Answer:

Sorry but it donest show the picture

Explanation:

My sister told me an extremely funny joke. what is the direct object for this sentence ?

Answers

Answer:

Explanation:

In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?

message = message + "Your password needs an uppercase letter. _____ "

\endline

\e

\n

\newline

Answers

You need to add \n to start a new line

The option that one need to add to the end of each message string to start each message on a new line is \n.

What is a message string?

This is known to be a kind of running aspect of text messages that relates to one topic or any question.

Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.

Learn more about program  from

https://brainly.com/question/1538272

#SPJ2

IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False

Answers

Answer: true

Explanation: true

What are the two main types of software​

Answers

system software and application software

Answer:

System software and application software

Explanation:

help me pleaseeeeeeee

Answers

Answer:

I think you have to ask to your parents

write 10 place where computer use and it uses​

Answers

Answer:

dynamite ohohoh

Explanation:

nânnananananananann eh

house store school park

Which of these would be the best way to inform an employee that they are losing their job?
Group of answer choices

group email

face-to-face conversation

instant message

personal email

Answers

Answer:

Terminations are a sensitive subject.

Even if you have strong reasons for letting an employee go, sitting them down to explain they are out of a job can be an awkward conversation.  

Some employers might be tempted to fire an employee using an impersonal method ⁠— like a phone call, email, or text ⁠— just to avoid that discomfort. But that is a very bad idea. We strongly recommend that employers should only fire staff during a face-to-face termination meeting.

Write a program Election that computes the tally in a write-in election, and announces the winner. Since the votes are write-in, there is no pre-determined set of candidates. Whoever appears the most in the votes is the winner. The user enters the individual votes, one vote per line, and ends entering with typing -1 or an empty line. To compute the tally, the program uses two arrays, a String [ ] variable (names), and an int [ ] variable (count). Upon receiving a single vote, the program checks if the name on the vote appears in names, and if it does, the program adds 1 to the value of the element in count. If the name does not appear in names, the program extends both arrays by one element, stores the name in names at the last position and store 1 in count at the last position. In this manner, the two arrays will have the same lengths. The initial length is 0 for both arrays. Below is an example of how the program may runplease I need to demonstrate the code,I need some comments next to every single line

Answers

The election program illustrates the use of ArrayLists, loops and conditional statements.

ArrayLists are resizable arrays, while loops and conditional statements are used to perform repetitions and make decisions, respectively.

The election program written in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

 public static void main(String[] args) {

     //This creates a Scanner object

   Scanner input = new Scanner(System.in);

   //This creates a string ArrayList for the names of the candidates

   ArrayList<String> names = new ArrayList<String>();

   //This creates an Integer ArrayList for the vote count of the candidates

   ArrayList<Integer> votes = new ArrayList<Integer>();

   //This declares name as string

   String name;

   //This gets input for the name of the candidates

   name = input.nextLine();

   //This is repeated until the user enters "-1"

   while (!"-1".equals(name)){

       //If name is in the list,

       if(names.contains(name)){

             //This gets the index of the name  

             int pos =names.indexOf(name);

             //This calculates the number of votes

             Integer value = votes.get(pos)+1;  

             //This adds the vote to the vote ArrayList

             votes.set(pos, value);

       }

       //If otherwise

       else{

           //This adds the candidate name to the name ArrayList

           names.add(name);

           //This adds 1 as the vote of the candidate to the vote ArrayList

           votes.add(1);

       }

       //This gets input for the name of another candidates

       name = input.nextLine();

   }

   //This prints the name of the election winner

   System.out.println("Winner : " +names.get(votes.indexOf(Collections.max(votes))));

 }

}

Read more about ArrayLists, loops and conditional statements at:

https://brainly.com/question/19504703

what is the hack of the cookie clicker

Answers

Answer:

Open Sesame

New Pokemon Games - The Loop. Open Sesame is the control panel for Cookie Clicker. It can be opened with a console command, or by changing the name of your bakery.

Explanation:

Hope this helps you !!

Hacking is a process to exploit a computer network system or a private network within a computer. Simply put, unauthorised access to or control of a computer network security system for unauthorised purposes.

To better explain hacking, we must first understand hackers. It’s easy to a Hacking assume that they are intelligent and highly skilled with computers.

In fact, breaking security systems requires more intelligence and expertise than actually creating them. There are no hard and fast rules that can classify hackers into neat categories. However, in common computer terminology, these are called white hats, black hats, and gray hats. White hat experts audit their own security systems to make them more resistant to hacking.

Learn more about network system here:

brainly.com/question/23294592

#SPJ6

when a driver receives a text while driving, what can 2022 versa’s hands-free text messaging assistant do?

Answers

Answer:

It can translate text to voice

Explanation:

goal of any user-friendly game should be to create a good what for the player?
A. user experience (UX)
B. user-interface (UI)
C. user intuition (UIT)
D. user skill (US)

Answers

Answer:

A

Explanation:

The goal of user friendly game is to provide UX.

For example a user friendly game will have much different interface than professional CAD program.

Answer:

user friendly.

Explanation:

I WILL GIVE BRAINLIEST TO WHOEVER HELPS ME

I keep pressing the "fn" key or "function" key and the disable / enable touchpad button
fn + f9 = enable/disable touchpad
but all it's doing is disabling it, everytime I press to enable it just keeps saying "touchpad has been disabled"

Answers

Assuming you're using Windows 10/11, navigate to settings --> Bluetooth and settings --> Touchpad (Or just search Touchpad on your search bar) --> Toggle the touchpad on.

Hope this helps! :)

2. Input a decimal number and test if it is not equal to 16.5.


3. If a number x, input from the keyboard is greater than 57, add 4 to x and print the

answer.


4. Input two numbers and find the average only if they are both less than 100.

Answers

Answer:

2:

decNum = float(input("Decimal number: "))

if decNum != 16.5:

   print("Does not equal")

elif decNum == 16.5:

   print("Equal")

else:

   pass

3:

if x > 57:

   x += 4

   print(x)

4:

numOne = int(input("Enter number: "))

numTwo = int(input("Enter number: "))

if numOne < 100 and numTwo < 100:

   yes = numOne + numTwo

   print(yes // 2)

else:

   pass

Explanation:

Please give me brainliest.

Please help please help

Answers

Answer:

Explanation:

je pense que la reponse est la suivante a et b puis c

This program is an example of:

def factorial(x):

if x == 1:

return x

else:

return x * factorial(x-1)

Group of answer choices

a do while loop.

recursion.

a for loop.

a while loop.

Answers

The program is an example of recursion

In computer programming, recursion is a process in which a function calls itself.

In a recursive program, there is a

base case and a recursive case.

When the condition of recursion is met, the base case is returned, else, the recursive case is continued.

In the function given above,

the base case is 'return x' under the condition 'if x == 1'. The recursive case is 'return x * factorial(x - 1)'.

So, the function runs until the base case it met and then it stops.

So, the program is an example of recursion.

Learn more about recursion here:

https://brainly.com/question/25797503

What's the technique of drawing a 3D object with one vanishing point?​

Answers

I don’t no it brother n I was searching for this answer can u plz tell me
A one-point perspective drawing means that the drawing has a single vanishing point, usually (though not necessarily) directly opposite the viewer's eye and usually (though not necessarily) on the horizon line. All lines parallel with the viewer's line of sight recede to the horizon towards this vanishing point.

One Point Perspective is a type of linear perspective that uses a single vanishing point to create the illusion of depth in a work of art.
Parallel – Parallel lines are lines that never touch… even if they are extended indefinitely.
Horizontal Lines – Lines drawn from side to side level with the horizon.

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

How should Jacob format the Notes Master so it will be most helpful to his audience?

Do not include a slide image, leaving the maximum room to take notes.
Do not include a notes pane because graphics do not need to be annotated.
*Make the slide image large so the charts can be seen clearly.
Make the text pane large so the audience can draw their own charts.

Answers

Answer:

C. Make the slide image large so the charts can be seen clearly.

Explanation: Edg

what is the similarities between traditional and modernized presentation​

Answers

Answer:

“Traditional” refers to those societies or elements of societies that are small-scale, are derived from indigenous and often ancient cultural practices. “Modern” refers to those practices that relate to the industrial mode of production or the development of large-scale often colonial societies.

john wants to draw a letter L. The turtle is pointing towards the top of the screen. Which series of commands will draw the shape? *

BACK 100 LEFT 90 FORWARD 50
BACK 100 RIGHT 90 FORWARD 50
BACK 200 RIGHT 90 BACKWARD 50
RIGHT 180 FORWARD 100 RIGHT 90 FORWARD 50

Answers

Explanation:

BACK 100 RIGHT 90 FORWARD 50

Match each type of Save option on the left with a function on the right.

Answers

Answer:

the above is correct

Explanation:

PLZ HELP! 50 POINTS!!!! Which device is used to change a signal into a code?


Group of answer choices


an encoder


an antenna


a wave

Answers

B) Antenna they receives signals

Answer:

It should be an encoder.

Explanation:

hope this helps and sorry if its wrong

A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False

Answers

After using my big brain it’s true

Describe the function of memory and
processing unit of Computer system​

Answers

Answer:

Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. ... This allows the CPU direct access to the computer program. Memory is needed in all computers.

Explanation:

hope it help

Other Questions
What Is the answer Plz it's urgent Tim is pushing a heavy box across the floor. He is using 300N of force and can accelerate at 2m/s/s. What is the mass of the box? -298 kg-600 kg-0.006 kg -150 kg Determine the amplitudeor period as requested.Period of y = 4sin 1/3xa. 4 b. Pi/4c. 4pi/3d. 6pi what is the output of the function when the input is 3 3 1/8 - b = 1 3/4how do I figure out what b is? Menciona dos palabras prestadas Historical Perspectives WhenChaucer wrote The Canterbury Tales,England was experiencing dramaticpolitical and social change as amiddle class began to emerge fromthe feudal system. How is thisdevelopment reflected in thePrologue? Work out the area of the triangle. The scale for anairplane is 1 cmfor 15 feet. If theplan is 9 cmlong, how long isthe actual plane? VOCABULARY Complete the sentences with the words from the box. help ASAP please hmmmm why is the high court and the supreme court of India known as the court of the records? Which system provides an easier way for people to communicate with a computer than a graphical user interface (GUI) SIMILARITIES between the first and second battle of panipat battlefield If f(x)=2x+1 and g(x)= x +3 find g(f(x)) and simplify completely. 15 more than the quotient of a number x and 12. DIRECTION: Below are statements describing the types of ingredients used in the preparation of sandwiches. ______________1. A staple food prepared by cooking a dough of flour and water and often additional ingredients. ______________2. Maybe beef, pork and sausage products. ______________3. Popular seafood which are highly perishable and should be kept chilled to moist as quality. ______________4. It moistens the bread and compliments the flavors of other ingredients. ______________5. These are relishes, olive oil and chutneys that give a lift to a sandwich. ______________6. Chicken or turkey breasts, tenderly cooked are seasoned. ______________7. These are indispensable in sandwich making because it add texture, flavor and color to sandwiches. ______________8. These are sliced thinly, firm texture, and act as binder, moistener of other ingredients. ______________9. It acts as a binder, moistener and other ingredients. ______________10. It refers to a food item made with two or more slices of bread with fillings between them. given f(x)=-3x^2-7x ,find f(7) the global patterns of atmospheric circulation and precipitation occur because of Does the light independent pathway of photosynthesis continue to occur when the leaf disks are placed in the dark environment