If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.

If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.

If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?

A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team​

Answers

Answer 1

Answer:

d

Explanation:

hi


Related Questions

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.

Answers

Answer:

D) Software problem

Explanation:

plz give me brainliest

D

edge2021      YWWWWWWWWWWWWWWWWWWWWW                                  

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)

Answers

Answer:

c. Web Application Frameworks

Explanation:

Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.

Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.

Hence, in this case, the correct answer is Web Application Framework.

What is the missing line of code?

>>> phrase = "You are amazing!"
>>> _____
'u a'

phrase[3:6]

phrase[2:6]

phrase[3:5]

phrase[2:5]

Answers

Answer:

phrase[2:5]

Explanation:

Given:

The above code segment

Required

Which instruction returns 'u a'

First, we need to get the index of u in the phrase:

u is at the third position but in programming, index starts at 0.

So, u is at index 2

Next, we need to get the index of a in the phrase:

a is at index 4

One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]

Where:

[tex]start = 2[/tex] ----- index of u

[tex]stop = 4[/tex]  ----- index of a

phrase ---- The string variable

So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]

Where 5 = 4 + 1

Answer:

phrase[2:5]

Explanation: got it right on edgen

Designing the right elements for the tasks that the user is attempting to perform is called ________.

Answers

Answer:

Interface design

Explanation:

INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.

Write one kid-friendly paragraph about a Software Developer's salary,.

Answers

According to BBC America, Software Developers made a median salary of $103,620 in 2018. The best-paid 25 percent made $130,460 that year, while the lowest-paid 25 percent made $79,340. The software developer field is growing in both salary and job volume. The BLS projects the software development (applications) field will grow by about 26% by 2028, with 241,500 jobs added by that time. This is compared with an estimated 12% growth for those in computer occupations.

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:

A) closest to; progressively smaller dimensions outward from

B) closest to; progressively larger dimensions outward from

C) farthest from; progressively smaller dimensions above

D) farthest from; progressively larger dimensions above

E) none of the above

Answers

The answer is B (Closest to; progressively larger dimensions outward from

Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is

Answers

Answer:

5kHz

Explanation:

There are four stages so N = 2⁴ = 16.

The frequency at nth stage is given by

[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]

The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.

What is a 4-bit binary counter?

On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.

We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."

The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.

There are four stages so N = 2⁴ = 16.

The 4-bit binary counter is 80 kHz.

In order to calculate the output frequency the  4-bit binary counter is divided by 16 which is equal to 5kHz.

Therefore, option A  is appropriate.

Learn more about the 4-bit binary counter, here:

https://brainly.com/question/29894384

#SPJ5

The complete question is Probably

Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.

What is the purpose of a Hyperlink

Can you answer both

Answers

Answer:

Number 16 is A Or B And Number 17 is B I think

Explanation:

What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links

Answers

Answer: b

Explanation:

help please with the question in the photo

Answers

Answer:

A

Explanation:

A because, why would someone want to listen to your own interests?

If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );

Answers

Answer:

C) someThing.someMethod( )

Explanation:

The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.

In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

Should video gaming be considered a school sport?

Answers

Answer:

I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.

Answer:

No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above

Answers

Answer:

d ) all of the above

Explanation:

is the correct answer

Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia

Answers

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.

What are utopias and dystopias?

Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.

Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.

Learn more about utopias and dystopias, Here:

https://brainly.com/question/905235

#SPJ2

Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?​

Answers

Answer:

no im not

Explanation:

but i sorry that you are

Question # 6
Dropdown
Choose the correct ending to the sentence below.


The function localtime() _____________________

Answers

Answer:

returns a different value every time you use it

Explanation: :)

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

Which important aspect of the Roman Empire did the barbarians destroy?

Answers

Answer:

centers of learning

Explanation:

Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.  

Answer:

i dont know but them barbs are crazy can't believe they were a thing back then

Explanation:

lol

8. Write the examples of freeware and Shareware softwares ?

Answers

Explanation:

People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.

Freeware software:

Adobe PDF

yahoo messenger

Go.ogle Talk

MSN messenger

People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.

Shareware software:

Adobe acrobat 8 professional

Winzip

Getright

an event handler is..

a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.

Answers

The answer here is C

Answer:

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.

Explanation:

First of all, let us define what an event is.

An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.

When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.

When the event occurs, the event handler for particular event is executed.

So from the given options,

The correct answer is:

Option c. a procedure that occurs as a result of a users action or another source.

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

What is the best use of network in homes

Answers

Answer:

Spectrem

Explanation:

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

Other Questions
Woman's degradation is in man's idea of his sexual rights. Our religion, laws, customs, are all founded on the belief that woman was made for man. Explanation : Archaeologists study (blank) theto learn about life in ancient Egypt. How do ions help your brain? What is the headline?A. The title of the articleB. The opposite of the footlineC. The conclusionD. The introduction A chief function of political parties is to a) conduct door to door surveysb) nominate candidates for officec) organize transportation to the pollsd) assist in monitoring overseas elections Factor the following expression: x^2+3x Please give me the correct answer If the moon moves farther away from the earth the earths oceans will experience what? Refer to the passage Jane Addams: A Heroine of the Progressive Movement by Lindsay Rock.Defend the authors claim that Jane Addams was a social reformer. Include at least three examples from the passage. 100 POINTS! PLEASE! What is a possible theme of every day use? A circle is graphed on a coordinate grid. Its center is at (3, 4), and the circle passes through point (3, 1). What is the approximate area, in square units, of the circle? (Use 3.14 for .) can someone help me please? Which input value produces the same output value forthe two functions?O x= -12O x= -9O x= -6O X=-3HELP PLEASE Identify the angle pair from the diagram above: In the Assembly Department of Hannon Company, budgeted and actual manufacturing overhead costs for the month of April 2020 were as follows. Budget Actual Indirect materials $16,000 $14,300 Indirect labor 20,000 20,600 Utilities 10,000 10,850 Supervision 5,000 5,000 All costs are controllable by the department manager. Prepare a responsibility report for April for the cost center. help me plz guys for 14 point K mola ofkg o okdgmbo9k Do dynasties still exist in positions of power in the world today? 3x^2+ 4x + 5 for x = -2 Please help I'm timed!!!Which of the following statements best describes chromosomes?A.Humans have more than 460 chromosomes in every cell of the body.B.Chromosomes are threadlike structures that carry genetic information.C.Humans receive the majority of their chromosomes from their mother.D.Chromosomes are arranged in 20 distinct pairs in the human body.Please select the best answer from the choices providedABCD