answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
2 years ago
4

If it is 12 am on January 7 in Reykjavík, Iceland (location B), what date and time is it in Galápago Islands,

Computers and Technology
1 answer:
ohaa [14]2 years ago
3 0

Answer:

Since the time zone of the Galapagos Islands is UTC -06: 00, while the time zone of Iceland (including its capital, Reykjavik) is UTC 00:00, the time difference between both territories is 6 hours behind in the Islands Galapagos with respect to Iceland.

Thus, since 12:00 AM implies 00:00 hours or the beginning of the day, if it were 12:00 AM on January 7 in Reykjavik, it would be 06:00 PM on January 6 in the Galapagos Islands.

You might be interested in
Explain what all sensory receptors have in common.
sp2606 [1]
The correct answer is that all receptors are considered to have the same feature, which is being a transducer.

Transducers change vitality starting with one form then onto the next. Generally, the receptor cells don't create an activation impulse by themselves. Rather, they create a progressively expanding potential, which triggers enactment of the afferent nerve fiber to which they are associated.
7 0
2 years ago
This subsystem defines the logical structure of the database by using a data dictionary or schema. multiple choice data manipula
zubka84 [21]
Data manipulation subsystem<span>provides tools for maintaining and analyzing data
</span>Application generation subsystem<span>provides tools to create data entry forms and specialized programming languages that combine with common and widely used programming languages
</span>Data administration subsystem<span>helps supervise the overall database; including maintenance of security, supplying disaster recovery support, and observing the overall performance of database operations</span>
7 0
2 years ago
Read 2 more answers
Instructions:
Digiron [165]

Answer:

Scenario 1: Advanced Encryption Standard (AES)

It is the best choice for the security of smart phones. AES is symmetric algorithm. It uses keys of 128, 192, and 256 bits and encrypts and decrypts fixed blocks length of 128 bits. It is effective  in encryption of all forms of electronic data. AES encryption is most widely used in smart phones to protect confidential data stored on the device such as bank account information, personal pictures, social security number etc.  It is considered as unbreakable encryption algorithms. For example if smartphone is using AES 256 encryption algorithm to secure its data from attacks, the encrypted data cannot be attacked if the key length is 256-bit as there would be 2256 possible combinations, and a hacker has got to try most of the 2256 possible combinations to guess they key which would take time beyond human lifespan.

Scenario 2:  Digital Signatures  

It is an electronic signature that is used to authenticate the identity of "message sender". It also makes sure that real content of the message has not been changed during transit. Since the company's concern is to protect confidential information from a rival so it the better choice as it assures authentication of message source and data integrity. Digital signatures generate a unique hash of message and use sender's private key to encrypt it. After it the message is signed digitally and sent. Receiver produces his own hash of message. He uses senders's public key to decrypt sender's hash and compares with his own hash. If they match it means the sender is the real one and the message contents are not altered.

Scenario 3: Elliptic curve cryptography (ECC)

It is an asymmetric general-purpose encryption technology. The basic idea behind this method is to generate simple, short, fast and difficult to break encryption keys. This is what the company requires that encryption technology must be general purpose, difficult to break. It uses elliptical curve theory for generating cryptographic keys instead of using large prime numbers. It is efficient to use for smartphones.  ECC does not require much processing power and memory. This results in less overhead faster response time and throughput on Web servers when ECC is being used.

Scenario 4. Secure Sockets Layer (SSL)

It is a standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server). SSL is a security protocol that transmits sensitive information securely. As we know data transmitted between browsers and web servers is sent in the form of plain text. If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  So SSL makes the web servers and web browsers to communicate with each other securely. When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate. The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected. Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it. SSL certificate is used for authentication purpose. For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.

Scenario 5: Advanced Encryption Standard (AES)

Confidential Services should choose AES. It is a symmetric encryption algorithm for protecting sensitive data. This means it uses symmetric key encryption in which only one secret key is used to encrypt and decrypt information. This algorithm is also used by U.S. Government agencies to secure sensitive material. Refer to the scenario 1 for more details about AES. It is a fast encryption standard. It is used in both hardware and software. Also it is strong in a sense that it comes up with an option for various key lengths. AES allows  a 128-bit, 192-bit or 256-bit key and are practically unbreakable by brute force based on current computing power

           

 

6 0
2 years ago
Consider the two relations with their schemas as listed below: Employee(name, empID, birthDate, gender, address, phone) TaxAccou
Allushta [10]

Answer:

CREATE TABLE TaxAccount (

Name int NOT NULL,

SSN int NOT NULL,

empID int FOREIGN KEY REFERENCES employee(empID),

federalDeductionAmt int NOT NULL,

stateDeductionAmt int NOT NULL,

ficaDeductionAmt int NOT NULL

);

Explanation:

TaxAccount table will use the primary key of employees table 'empID' which will serve as foreign key in TaxAccount table.

Therefore TaxAccount table will look like this:

CREATE TABLE TaxAccount (

Name int NOT NULL,

SSN int NOT NULL,

empID int FOREIGN KEY REFERENCES employee(empID),

federalDeductionAmt int NOT NULL,

stateDeductionAmt int NOT NULL,

ficaDeductionAmt int NOT NULL

);

5 0
2 years ago
Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
Rudiy27

Answer:

Explanation:

Displayport

3 0
2 years ago
Other questions:
  • Brake lights on freeways invite A: law enforcement B: panic C: sudden lane changing D: both B and C E: positive driving habits
    13·1 answer
  • If a car's is malfunctioning, people in the car will become ill when driving long distances, especially if the windows are close
    6·2 answers
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
    13·1 answer
  • Address the FIXME comments. Move the respective code from the while-loop to the created function. The add_grade function has alr
    14·1 answer
  • How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
    5·1 answer
  • Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
    8·1 answer
  • [Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
    12·1 answer
  • 3.34 LAB: Mad Lib - loops in C++
    14·1 answer
  • Identify a data type applied in an input element to create slider controls.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!