what is the answer
i don't know how to decode this, could i get the answer without any links

What Is The Answeri Don't Know How To Decode This, Could I Get The Answer Without Any Links

Answers

Answer 1

Answer:

Try the Cesar cypher

Explanation:

The Cesar cypher shifts the letters one side


Related Questions

You can access elements in a list by using an index the same way that you can index a character from a.

Answers

One can access elements in a list by using an index the same way that you can index a character from indexing into the string.

What is String Indexing?

Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.

They can be accessed straight through the use of  numerical index. String indexing in Python is known to be a kind of zero-based in nature.

Learn more about indexing from

https://brainly.com/question/4692093

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.

Answers

To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.

What is technology promotion?

The use of technology is one that can promote student zeal by given them a form of positive experiences.

Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.

Learn more about technologies from

https://brainly.com/question/25110079

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

write a program to calculate sum of first ten natural numbers​

Answers

Answer:

Explanation:

total = 0

i = 0

while i<=10:

   total = i +total

print(total)

a customer willl borrow

Answers

Answer: C. the PC

Explanation: The motherboard is not included in the passage

Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery

Answers

Answer:

C. HTML tags

Explanation:

In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

Which of the following is NOT a correct flowchart shape?

A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star

Answers

I think the answer is star because in a flowchart, the most common shapes are a parallelogram, ovals, diamonds, and rectangles. Stars aren’t used in flowcharts.

Hope this helps :)

Answer: Star

Explanation:

The master program that manages how other software can use the computer hardware is called the:.

Answers

the master program that manages how other softwares use the computers hardware is called the bios

How many internet browser sessions can you have open at one time?.

Answers

Theoretically there is no limit that I know of, however it uses RAM and will eventually use all available RAM.

_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.

Answers

Answer:Encryption

Explanation:I took my test for CIS 110 and guessed and got this question right.

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

The answer is D
Ik this cause I took the test

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.

In what way. If any, does click-lacking differ from cross-site scripting?

Answers

Answer:

In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.

Explanation:

A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system

Answers

The team that should operates the security system is the blue team.

What is war gaming strategy?

In a war game approach, the teams of the senior managers of a  firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.

Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.

Learn more about cybersecurity from

https://brainly.com/question/26260220

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?.

Answers

You did not post the full question but if there is one called “hyper visor” or “Xen” or something to do with that, it’s probably the answer.

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

The following flowchart symbol is used to repeat instructions:

A. Rectangle
B. Square
C. Circle
D. Hexagon

Answers

d

Explanation:

⇛σ=

n

∑f(x−

x

)

2

Find f(x-x^-)²

It's

313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29

3360.5

Now

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}

⇛σ=

67.21

\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}

⇛σ=8.2

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends

Answers

The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.

How can I employ Predictive Scaling with target tracking?

Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.

Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.

Learn more about Autoscaling  from

https://brainly.com/question/17661222

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as _____.

Answers

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.

What is webpage context?

The web page context is known to be a kind of special ID that is is formed with all the new page load event.

The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.

Learn more about website design from

https://brainly.com/question/25941596



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not

Answers

Answer:

take a subtle aproach

Explanation:

[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.

Answers

It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.

What arithmetic operations cannot be done on pointers?

We cannot carry out all type of arithmetic operations with the use of the pointers.

Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.

Learn more about arithmetic operations  from

https://brainly.com/question/4721701

A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.

Which options should they choose during their evaluation process? Check all that apply.

a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated

Answers

A professor who publishes world population research in a journal

Answer:

b,c,d

Explanation: i took the test and bc im awsome

In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO

Answers

Answer:

Boot loader

Explanation:

This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory

Other Questions
Disenfranchisement is the denial of the rightSelect the best answer from the choices provided..to own property and conduct businessOB.to vote in elections.to migrate to a different stateOD. to preserve one's life and libertyResetNext Given the regular polygon ABCDEF with side lengths of 16 km, find the area of the shaded region. Round your answer to the nearest tenth. How many cups of water should be mixed with 1/4 cup of vinger to make the cleaning solution What happens when sunlight strikes a chlorophyll molecule? Electrons in the mitochondria. Electrons in the chlorophyll molecule become energized and move. Electrons within the cell membrane become energized and move. Electrons within the cell's nucleus are transferred to the chlorophyll molecule. Can X = 2 be linear function For exercises 1-4. use the drawing and an inch ruler to find the actual length and width of each section of the park. Measure to the nearest eighth of an inch. What is the scale factor of the park plan? A mountain in Jackson County is eroding and losing elevation at a rate of 5% everymillennium. If the current elevation is 1,300 meters, how tall will the mountain be in 8millennia?mund your anuor to the noroctwhold number Hello people ~Appearance of vegetative propagules from the nodes of plants such as sugarcane and ginger is mainly because (a) nodes are shorter than intemodes(b) nodes have meristematic cells(c) nodes are located near the soil(d) nodes have non-photosynthetic cells What is considered one of "the most versatile" types of illustrated storytelling? 60 PTS PLS HELP! Data Set 1 has a mean of 152.7 and a MAD of 2.5.Data Set 2 has a mean of 170.2 and a MAD of 1.7.What can be concluded about the two distributions?Select each correct answer.The means-to-MAD ratio is 10.The distributions are different.The distributions are somewhat similar.The means-to-MAD ratio is 7. Which expression is not equivalent to 2\3 x 4? Which tags should be bolded? Stories about Greek gods and goddesses are called? A squared garden has am area of 81 squared meters what is the permiter of this garden What author and book brought to light womens unhappiness with their roles and initiated the second wave of the womens movement?Betty Friedan and The Second SeSimone de Beauvoir and The Feminine MystiqueSimone de Beauvoir and The Second SeBetty Friedan and The Feminine Mystique I don't understand someone please help Which of the triangles shown are scalene triangles?A group of triangles. Triangle A has three acute angles and two equal sides. Triangle B has two acute angles, one ninety degree angle, and two equal sides. Triangle C has three acute angles and two equal sides. Triangle D has two acute angles and one obtuse angle. All the sides on this triangle are different lengths. Your English teacher ask you to write a story .Your story must begins with the sentence; "Louis smiled as she put the ticket in her pocket and walked out of the house ." B was 42 when the life insurance policy was issued. 42 is referred to as the ______ age of the policy. A Do Not Redconsider the net of a rectangular pyramid.156 ft63 ft S132 ft63 ft66 ft1156 ftWhat is the surface area, in square feet, of the rectangular pyramid?A 336 ft2B 434 ft2C 2,350 ft2D 7,824 ft2