Which of the following describes email nonrepudiation?

A.
the elimination of emails that may contain dangerous viruses

B.
the review of every email sent by the CIA

C.
the use of tracking methods that can identify senders and their locations

D.
the use of encryption methods that ensure senders and their locations cannot be identified

Answers

Answer 1

Answer:

I believe the answer is C, im sorry if im wrong


Related Questions

define the term malicious program

Answers

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

Write a program which will -

• Enter the score the student got in the test.
• Enter the maximum number of marks for the test.
• Divide the score by the maximum to work out the percentage.
• Check to see if the percentage is greater than 52. If it is then say "well done you have at least a grade 5"
• If the percentage is less than 52 then display "Unlucky, you need to revise more for the next test."
Will give out brainliest :)

Answers

Answer:

down below

Explanation:

score = input() # gets student's score input

max = input() # gets max number

percent = (score/max)*100 # multiply by a hundred to get percentage

if percent > 52: # checks if percent is greater than 52

  print("well dont you have at least a grade 5")

else # if percent is less than or equal to 52 it will print this instead

  print("Unlucky, you need to revise more for the next test.")

THIS PART IS NOT CODE:

make sure you indent/tab the print statements or else you'll get an error

What is the interface of an app?
a storyboard software
the part the user sees
a sketch of your idea
a testing environment

Answers

Explanation:

An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.

Which of these problems is correct if the numbers are binary numbers?
Group of answer choices

1 + 1 = 2

1 + 1 = 10

0 + 0 = 1

1 + 0 = 10

Answers

Answer:

1 + 1 = 10

Explanation:

2 does not occur in the binary "alphabet"

0 + 0 = 0 in any base, so also in binary

1 + 0 = 1 in any base, so also in binary

The answer is 1 + 1 = 10
1 = 1 in binary numbers, so 1 + 1 = 2 but 2 in binary numbers is 10, 2 doesn’t exist in binary numbers, it is only 1s and 0s so therefore it would be 10.

Katie is writing a print statement but nothing is printing. Which of the following should she check for?

A.
Make sure the print statement is surrounded by parentheses.

B.
Make sure the word print is in all capital letters.

C.
Make sure there is a colon after the print statement.

D.
Make sure the next line after the print statement is indented.

Answers

Answer:

A.

Explanation:

Parenthesis are required to be around the data in a print function. All the letters in a  print statement should be lowercase. A colon isn't required after a print statement. Indentation is not needed for a print statement because there are no colons after the statement instead. Here's an example where you would need to indent the line:

def randNum( x, y ):

    x = input("Enter number: ")

    y = input("Enter number: ")

    return x * y

Here's an example of a print statement:

print("My name is Sullen.")

Aliaa and Zhang Li are tennis-playing robots. Aliaa is 715\,\text{cm}715cm715, start text, c, m, end text from Zhang Li and 2{,}200\,\text{cm}2,200cm2, comma, 200, start text, c, m, end text from the far corner. Zhang Li measures an 91\degree91°91, degree angle between Aliaa and the far corner, as shown.


From Aliaa's viewpoint, what is the angle between Zhang Li and the far corner?

Do not round during your calculations. Round your final answer to the nearest degree.

Answers

Answer:

70

Explanation:

Law of Sines.

sin(91)/12 = sin(x)/715

x=19

180-91-19=70

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

what will the computer do in response to a line of code reading # name = input("What is your name?") print “What is your name?” print “name =” nothing return a syntax error

Answers

The computer will do nothing in response to the instruction # name = input("What is your name?")

The instruction is given as:

# name = input("What is your name?")

The above instruction is a Python instruction.

In Python, lines that begin with # are not executed, because they are treated as comments.

This means that, the computer will not do anything when it comes across the instruction

Read more about Python instructions at:

https://brainly.com/question/19344465

how does digital and hybrid computers differ in portability​

Answers

Answer:

Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.

Explanation:

I passed the class A+

yourwelcome :)

thank me if it was correct for you too.

imagery functions as a coding system to help individuals acquire movement patterns. this describes

Answers

Answer:

Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.

How does the computer help me with school work

Answers

you are able to mark your answers on tests and save your work, while on paper, you get it taken away from you.
A computer can be helpful in completing your schoolwork by giving you access to countless sources of information, while educational games and programs can make learning fun. You'll also easily be able to submit neat, organized papers by using the computer's word processing, spreadsheet and presentation programs.

If your company uses a non-price competition strategy what should you focus on
A. lowering prices
B. differentiation
C. creating direct competitors
D. the public sector

Answers

B- differentiation

nonprice competition strategy refers to strategy to win a business competition that does not involved lowering price of the product.

Businesses mostly do this using differentiation strategy, which is increasing the different variety of product that they sell in the market.

A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.

Answers

Answer:

button

Explanation:

write a program to print even numbers from 1 to 20​

Answers

Answer:

If qbasic then

pls mark barinist

Answer:

print(“2 4 6 8 10 12 14 16 18 20”)

codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this

Answers

The listed greetings program is an illustration of Python functions.

The error in the program is that the program is not properly indented.

Python program uses indents to identify blocks of code.

So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:

def greetings(s):

   x = s.split()

   print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")

Read more about Python programs at:

https://brainly.com/question/16240699

A numeric test score is to be converted to a letter grade of A, B, or C according to the following rules: A score greater than 90 is considered an A; a score between 80 and 90, inclusive, is considered a B; and any other score is considered a C. What code segments will assign the correct letter grade to grade based on the value of the variable score?

Answers

The code segment makes use of conditional statements.

Conditional statements in programming are used to make decisions

The code segment in C++ is as follows

if (score > 90) {

grade = 'A';

}

else if (score >= 80 && score < =90) {

grade = 'B';

}

else {

grade = 'C';

}

The above code segments take the score, make comparison, and then determine the appropriate letter grade.

Read more about code segments at:

https://brainly.com/question/20475581

II and III

Explanation:If it is the test i think it is

I is incorrect because it is saying that automatically it is set as C but if the score is over 90 then you get an A if it's anything else then it's a B. This is false because then your outcome will never be C. It would only be A or B.
II is correct because it starts off by saying that if the score is greater than 90 then you'll get an A if else then if your score is equal to or greater or equal to than 80 then you get B and then if anything else then it's a C. This incoorporates everything.
III is also true because it start off by saying if anything is below an 80 then you automatically get a C. If it's anything over than 80 then if it's equal to or less than 90 then you get a b and if it's anything else then you get an A. This also checks out which means it's true.
So the answer is II and III

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

What do you mean by Data Types? Give Examples.
Ms Access question​

Answers

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

What is the output for the following program?
numA = 4
while numA <12:
numA = numA + 3
print(numA)
Output:

Answers

Answer:

13

Explanation:

int numA = 4;

whilie (numA < 12){

  numA += 3;

}

System.out.print(numA);

numA          numA < 12

  4                   true ⇒ numA increases by 3, loop continues

  7                   true ⇒ numA increases by 3, loop continues

  10                 true ⇒ numA increases by 3, loop continues

  13                 false ⇒ loop stops, program them prints out value of numA

the service you are attempting to use is restricted

Answers

Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.

Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.

When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.

A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.

Learn more about restricted from

https://brainly.com/question/15870692

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

lenny joggy along a trail for 1.35 hours he ran at a pace of 3.2 miles per hour. how far did lenny jog?

Answers

Answer:

Lenny jogged along a trail for 1.35 hours. He ran at a pace of 3.2 miles per hour. How far did Lenny jog? Answer Lenny jogged 4.32 miles.

Explanation:

Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:

1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence


file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite

Answers

Answer:

she gives 10 dollars an hour

Explanation:

no

Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer:

false

true

false

true

false

Explanation:

.

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

goal of any user-friendly game should be to create a good what for the player?

A.
user experience (UX)
B.
user-interface (UI)
C.
user intuition (UIT)
D.
user skill (US).

Middle school question edmentum please add pic or just give answer

Answers

Answer:

with me being a gamer i know for a fact i love getting a good experience but also using my own thoughts into the game to help make decisions. so for the sake of your question its gonna be C; UIT

Answer:

A

Explanation:

User Experience is what makes a use friendly game accessible and enjoyable

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Answers

Answer: Database administration

Explanation:

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

Answers

Answer: bastion host

Explanation:

What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that they receive B. Switches cause more data collisions than hubs b C. Switches are capable of sending and receiving data at the same time D. Switches send each packet to all of the computer that are connected to them.​

Answers

Answer:

A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time

Explanation:

Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.

Hope this helps! Have a great day!

Other Questions
Ustedes _____ a la clase de historia1.Voy2.Va3.Von4.vamos 5.Vas Which numbers on the spinnerhave less than a 25% probabilityof being spun? list theamino acids that are coded for by the codonsAGU, GGG, CCU, and GUG. What is a consumer product? James is observing the population of the fish he put into a pond. He built a pond and populated it with 700 fish. The population of the fish doubles every year. Use x to represent the number of years and y to represent the population of the fish. Enter an equation that represents this scenario in the box. What three-day battle fought in July of 1863 was brought about by an advance by Confederate forces into the northern territory? Second Battle at Bull Run Bull Run Antietam Gettysburg 3 Z The quadratic equation whose roots twice the roots of :2X2-8X+5=0 Your class rank in 2018 was 89 out of 360 students. In 2019 your class rank was 95 out of 450 students. a. In which year did you have the higher percentile ranking. b. If you had the data on the cumulative GPA of each student at the end of the spring semester in 2018, which measure of average would be the most meaningful mean, median, mode? Explain Beverly is making peanut butter-banana bread. She always doubles the amount of nuts and peanut butter chips. The total amount of chips and nuts after doubling is 412 cups.and plz get equation as well 20.4 is what percent of 17? What are three solutions of the inequality 29x+4 -4-(-8) divided by 4 14. A(n)is a noun or pronoun that followsan action verb and is the receiver of the action. i think its C but wanna be sure what is the fifth term of the linear sequence which begins 20, 14, 8 what does las posadas commemorate during the advent season What will a 68% do to a 72.99%? 11/19% of a quantity is equal to what fraction of the quantity? Which compound contains ionic bonds?No No2CaOCO2 Nancy has just been admitted to the emergency room because she collapsed in her home. The medical worker who begins filling out her chart takes her vital signs and measures her height and weight. What might the medical worker use her height and weight measurement for?