Task:
Create a program in java with scanner input allows a user to input a desired message and then
the message encrypted to a jumbled up bunch of characters
Include functionality to decrypt the message as well
Extra Information:
Completion of this project requires knowledge of string buffers in Java
○ A string buffer is like a String, but can be modified. At any point in time it contains
some particular sequence of characters, but the length and content of the
sequence can be changed through certain method calls.
○ This is useful to an application such as this because each character in the
password string needs to be modified. Use the following code to set a string buffer:
StringBuffer stringName = new StringBuffer(‘some string’);
Hints:
○ You will need to loop through each character in your password string to modify
○ You will need to find the ASCII value for each character (some number)
■Need to look up method to do this
○ You will create a complex algorithm (mathematical formula) of your choice to
encrypt the password characters
○ Convert new ints back to characters (from ASCII table) for scrambled characters
and set back to string
■ Need to look up method to do this

Answers

Answer 1

The task is to create a Java program that allows a user to input a desired message, which will then be encrypted into a jumbled-up sequence of characters. The program should also include functionality to decrypt the encrypted message.

To accomplish this, the program will use a StringBuffer to modify the characters of the message and apply a mathematical algorithm to encrypt and decrypt the characters. ASCII values will be used to represent the characters and convert them back to their original form. To create the Java program, we can start by using the Scanner class to accept user input for the desired message. We will then initialize a StringBuffer object with the message provided by the user. The StringBuffer allows us to modify the characters of the message.

Next, we will loop through each character of the StringBuffer and apply a mathematical algorithm of our choice to encrypt the characters. This could involve manipulating the ASCII values or applying any other encryption technique. The algorithm should scramble the characters and make them difficult to understand. To encrypt the characters, we can convert them to their respective ASCII values using the `charAt()` and `ASCIIValue()` methods. Then, we perform the necessary transformations according to our algorithm. Once the encryption is complete, we convert the encrypted ASCII values back to characters using the appropriate method.

For decryption, we reverse the encryption process. We convert the characters of the encrypted message to ASCII values, apply the decryption algorithm to retrieve the original ASCII values and convert them back to characters. Finally, we can display the decrypted message to the user. It is important to note that the specific algorithm used for encryption and decryption will depend on the desired level of security and complexity. It could involve simple transformations or more sophisticated techniques. The program should provide a user-friendly interface for inputting and displaying the messages, allowing for encryption and decryption of the desired text.

Learn more about Java program here:- brainly.com/question/2266606

#SPJ11


Related Questions

Replacing several underutilized smaller servers with one large server using a virtualization technique is one of the ways that green computing can be achieved. True or False

Answers

Replacing several underutilized smaller servers with one large server

using a virtualization technique is True about green computing.

What is Green computing?

Green computing is defined as the use of computers and their resources

in an eco-friendly and environmentally responsible manner. This includes

the following:

Electronic and Paper Recycling activities.Use of Virtual Technologies

This is why the statement above is True about Green computing.

Read more about Green computing here https://brainly.com/question/1729709

Give 15 examples of copyright and trademarks that we come in contact with everyday. (Doesn't hve to be 15 could be 3 or 5) PLEASEEEE HELPPPP

Answers

Roads, trading, Government, water systems,

Which keys should you press to insert a comment in OpenOffice Writer?
A.
Ctrl+Alt+I
B.
Ctrl+Alt+C
C.
Ctrl+Alt+O
D.
Ctrl+Alt+N
E.
Ctrl+Alt+M

Answers

Answer: Ctrl + Alt + C

Explanation:

Video camera camcorder digital camera recorder kicteck full hd 1080p 15fps 24mp 3. 0 inch 270.

Answers

The Kicteck Full HD 1080p video camera camcorder digital camera recorder is a popular device for capturing high-quality videos and photos.

This camera comes equipped with advanced features such as 15fps frame rate, 24MP image resolution, and a 3.0-inch 270-degree rotating screen, making it a perfect choice for both professional and amateur photographers and videographers. With its compact design, this camera is also easy to carry around and is perfect for capturing life's precious moments.

In conclusion, if you're looking for a reliable, high-quality digital camera recorder, the Kicteck Full HD 1080p video camera camcorder is a great choice. Its advanced features, ease of use, and compact design make it an excellent investment for anyone looking to capture life's special moments with high-quality video and photos.

To learn more about digital camera, visit:

https://brainly.com/question/30609911

#SPJ11

Pls help if you know about coding
Im trying to make the Mexican flag note u have to use put-image

Pls help if you know about codingIm trying to make the Mexican flag note u have to use put-image

Answers

Three red, white, and green vertical stripes make up the Mexican flag. The national crest, an eagle perched atop a cactus holding a serpent in one of its talons, is displayed on the center white stripe of the flag.

What is the image on the flag of Mexico?Mexicans take immense pride in their flag. Every morning in Mexico City's prominent Zócalo square, soldiers from the Mexican army ceremoniously hoist a huge flag. The flag is so heavy that it requires more than a dozen workers to carry it to the flagpole every day.Red, white, and green vertical stripes make up the Mexican flag. The national crest, an eagle perched atop a cactus holding a serpent in one of its talons, is depicted on the main white stripe of the flag. The first Mexican flag was formally displayed in 1821, and although it has undergone some minor changes since then, the current design is nearly identical to the original that was produced nearly 200 years ago. Contrary to popular belief, which holds that the Mexican flag is just the Italian tricolor with the Mexican national crest affixed to it, the Mexican flag was actually designed first, before the Italian flag.  Aside from that, the Mexican flag has a different proportion and uses darker shades of red and green. As a final point, the flag differs greatly from the Italian tricolor due to its symbolic meaning.

To Learn more About Mexican flag refer to:

https://brainly.com/question/8739467

#SPJ1

application of computer in the field of hotel management?​

Answers

Answer:

1) Computers are used extensively by lodging managers and their assistants to keep track of guests' bills, reservations, room assignments, meetings, and special events. In addition, computers are used to order food, beverages, and supplies, as well as to prepare reports for hotel owners and top-level managers.

Explanation:

Simplest Technologies developed a complete Hotel Management System application, designed for multiple computers via LAN. It features a whole range of integrated modules including front desk, housekeeping, restaurant management, statistics, and MIS reports.

This innovative Hotel Management System offers you unmatched flexibility in managing your day-to-day business operations. Starting from the interactive system of effectively managing hotel rooms with multiple rates like individual rates and the corporate rate to preparing review reports and MIS reports and all kinds of sales reports with a wide range of statistics, this Complete Hotel Management System is worth in the business proposition.

There are many different uses for computers in hotels. The first would be at the front desk. These computers have intricate software called the Property Management System (PMS) to do all the check-ins, guest accounting, etc. The most famous is Opera or Sabre.

Second, in the restaurant, lounge, or bar is a new computer entirely called a Point of Sale System (POS). This will collaborate with a PMS to bill guests for a meal, etc, but can also be used as a cash register. The third is the computer in the sales office, which software is most likely Delphi which is a booking terminal.

To learn more about the application of computer visit the link:

https://brainly.com/question/15226105

How much money would that same computer cost in louisville county, kentucky? what about in coffee county, alabama?.

Answers

The about of money that you save if you bought it in Davidson County is:

It will cost about $1,097.5 in Williamson County.It will cost about $1,092.5 in Davidson County.$5 is the amount which will be saved.What does saving money entail?

Savings is the money that remains after expenses and other commitments have been subtracted from income. Savings are the sum of money that would otherwise be lying about, not being risked on investments or used for consumption.

Deferred consumption, or not spending money, is saving. Savings strategies involve setting money aside in places including cash, investment funds, pension accounts, and deposit accounts. Reducing expenses, such as regular expenses, is another aspect of saving.

Hence,

In  Williamson County, the sales tax rate is 9.75% = 9.75% × $1,000 = $1,097.5

In Davidson County , the sales tax rate is 9.25% =  9.25%  × $1,000 = $1,092.5

The total amount saved will be: $1,097.5 - $1,092.5 = $5.

Learn more about money  from

https://brainly.com/question/27167637
#SPJ1

See full question below

If you were to buy a $1,000 computer in Tennessee, how much would it cost in

Williamson County? How much would you save if you bought it in Davidson County?

Answer:

Louisville County $1,060

Coffee County $1,050

Explanation:

Louisville: 6 x 1,000 = 6,000 hit the percent button and you get 60 then just add that to the original 1,000. Do the same thing with Coffee County

Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts of the college's intranet.

What type of network is Jennifer using?

Answers

Answer:

Extranet!

Explanation:

According to the Dictionary, an Extranet is an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely! I also got it correct in a test i did :]

Hope this helps :]

When referring to hard drives, access time is measured in?
O kilobytes
O milliseconds
O megahertz
O bits per second

Answers

It is Milliseconds I think I’m not sure if it’s wrong I’m sorry

What are the different types of peripherals and give some examples in each category? What do you think would be a really cool type of peripheral that could be developed in the future?

Answers

Explanation:

Remember, peripheral devices are portable devices connected to a computer in other to add more functionality to the computer system such as a printer, mouse, hard drive, CD-ROM, etc.

A really cool type of peripheral that could be developed in the future is a voice-enabled mouse that can perform normal operations on the computer.

a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance​

Answers

he will need to take 5,004 steps to cover 3003m distance
3003/18=166.8
166.8 x 30=5004
Answer is 5004

Which line of code outputs the decimal portion of a float stored in the
variable x?

Answers

Answer:

the answer is a

Explanation:

Rules for addressing and sending data across the internet by assigning unique numbers to each connected device is called: ________

Answers

Answer:

the Internet Protocol (IP).

Which of the following VLANs receives all untagged frames from untagged ports? a) Data VLAN b)Voice VLAN c) Native VLAN d)Management VLAN

Answers

The correct answer is option c. The VLAN that receives all untagged frames from untagged ports is the Native VLAN.

VLANs (Virtual Local Area Networks) are used to create separate broadcast domains, which help in better traffic management and improved network security. Untagged frames are data packets that have not been assigned a specific VLAN ID. When a frame enters an untagged port, it is assigned to the Native VLAN by default. This allows the frame to be processed and forwarded within the designated broadcast domain. It is essential to configure the Native VLAN consistently across all switches in the network to ensure proper handling of untagged frames.
In contrast, Data VLANs are designed for carrying user data traffic, while Voice VLANs are dedicated to carrying voice traffic for VoIP applications. Management VLANs are used for managing network devices and provide a separate, secure channel for network administrators to access and configure switches or routers.
In summary, the Native VLAN (option c) is responsible for receiving all untagged frames from untagged ports in a network, ensuring smooth communication and preventing misconfigurations or security issues.

Learn more about VLAN  here;

https://brainly.com/question/32113543

#SPJ11

How would using a rating system in a digital guide help users?

Answers

Using a rating system in a digital guide can be extremely beneficial for users in several ways: Firstly, a rating system can provide users with a quick and easy way to gauge the quality and relevance of the information provided in the guide.

Additionally, a rating system can help users to find the most popular and useful sections of the guide. By sorting the content based on ratings, users can easily identify the most highly rated and relevant sections of the guide, saving them time and effort in their search for information.

Furthermore, a rating system can encourage user engagement and participation, as users are able to share their own feedback and opinions on the content. This can create a sense of community and collaboration among users, as they work together to improve the quality and usefulness of the guide for everyone.

Learn more about rating system: https://brainly.com/question/29353028

#SPJ11

how many network interfaces does microsoft recommend be installed in a hyper-v server?

Answers

Microsoft recommends at least two network interfaces be installed in a Hyper-V Server.

This is because the first network interface is used for management purposes while the second network interface is used for virtual machine traffic.The purpose of the first network interface is to handle traffic between the Hyper-V host and its guests.

This network interface is dedicated to Hyper-V management traffic and should not be used for any other purposes.In contrast, the second network interface is used by the virtual machines hosted on the Hyper-V host.

This network interface is responsible for managing virtual machine traffic between the virtual machines and external networks.

Therefore, at least two network interfaces are required for a Hyper-V Server, and it is best practice to separate Hyper-V management traffic from virtual machine traffic to enhance the security of the host network.

Learn more about network at

https://brainly.com/question/30024903

#SPJ11

Please read !!!

Please help I am in 6th grade and I have no motivation to do anything. My parents see me as a failure to the family. I'll do anything for anyone to just help me or log in and do my work for me. I'm stressing my whole family out with me not doing my work. I'd appreciate if someone could help me. Thank you.​

Answers

Don’t stress. You’re no failure if you believe in yourself. Have some faith. Don’t give up and live your life to the fullest. Take care and stay safe!! :)

O
(c) Write a code segment to change the name of the Thing object something such that the new name consists of the old name with one character removed at random. For example, if
something has name "ABCD", its new name could be set to "ACD
Write the code segment below

Answers

The program written in python 3 which randomly removes one alphabet from a string and returns the new string is written thus:

import random

#import the random module

def rand_minus(s):

#initialize a function named rand_minus which takes on one parmaters, which is a string

minus_1 = random.sample(s, len(s)-1)

#using the sample method in the random module, randomly select alphabets which is one lesser than the number of alphabets passed in.

new =''

#initialize an empty string named new

for alp in minus_1:

#loop through the randomly selected alphabets in the list

new+=alp

#place each alphabet in the empty string created

return new

#return the string in the new variable.

# A sample run of the program and its output are attached below.

old = 'ABEFCD'

print(rand_minus(old))

Learn more :https://brainly.com/question/25210352

O(c) Write a code segment to change the name of the Thing object something such that the new name consists

which image correctly represents the cloud computing architecture

which image correctly represents the cloud computing architecture
which image correctly represents the cloud computing architecture

Answers

Answer:

C

Explanation:

Just got this answer correct! Unable to post example image, but this is the flow.

BACK END

INTERNET

CLIENT INFRASTRUCTURE

FRONT END

Option C image is correctly represents the cloud computing architecture.

What is computing architecture?

Computing architecture is defined as a set of guidelines and procedures outlining the operation, administration, and use of computers. To be accurate, it is just the set of rules that a system follows to function. Computer architectures describe how a computer's hardware components are connected to one another and how data is transferred and processed.

The way technological elements come together to create a cloud, where resources are pooled through virtualization technology and shared across a network, is known as cloud architecture. The elements of a cloud architecture are as follows: an entrance platform A virtual machine (VM) instance's configuration, information, permissions, and data are all stored in a machine image, which is a Compute Engine resource.

Thus, option C image is correctly represents the cloud computing architecture.

To learn more about computing architecture, refer to the link below:

https://brainly.com/question/13942721

#SPJ2

____ integrity constraints help to ensure the accuracy and consistency of individual field values. a. Data typeb. Legal valuec. Formatd. Secondary

Answers

a. Data type integrity constraints help to ensure the accuracy and consistency of individual field values.

Data type integrity constraints define the data types that can be stored in a specific field. They ensure that the data entered in a field is of the correct data type and within the range of acceptable values. For example, a field with a data type of "integer" can only store whole numbers, while a field with a data type of "date" can only store valid date values. Data type integrity constraints help prevent data entry errors and ensure that data is consistent across the database, which is essential for accurate analysis and reporting.

learn more about Data here:

https://brainly.com/question/27211396

#SPJ11

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2

Wwhat term is used to describe the number of bytes of memory a process has designated for use and that are promised to a designated portion of the page file?

Answers

The term used to describe the number of bytes of memory a process has designated for use and that are promised to a designated portion of the page file is known as "committed memory."

Committed memory refers to the amount of virtual memory that has been reserved for a process and is guaranteed to be available for use. When a process requests memory, the operating system allocates virtual memory to it, which may or may not be backed by physical memory. The committed memory includes both physical memory and space in the page file on disk. The page file is a portion of the hard disk that acts as an extension of physical memory when there is a shortage of RAM.

The committed memory represents the total amount of memory a process has requested, regardless of whether it is actively being used or not. It includes the memory that has been explicitly allocated by the process, as well as any memory that has been implicitly reserved by the operating system on behalf of the process. The committed memory size can affect system performance, as excessive memory commitments may result in increased disk activity when the system needs to swap memory pages between RAM and the page file. Monitoring and managing committed memory is important to ensure efficient memory usage and avoid potential performance issues.

learn more about s "committed memory." here:

https://brainly.com/question/12717884

#SPJ11

2. A 32-bit word computer system has a main memory of 2 GB, and has a 16 MB 8-way set associative cache with a line size of 32 words. How many bits is each field of the address (Tag, Index, Word, Byte)

Answers

The number of bits required for each field of the address are as follows:

Byte offset: 2 bits

Word index: 5 bits

Set index: 19 bits

Tag: 6 bits

To determine the number of bits required for each field of the address, we need to know the sizes of the main memory, cache, line, and set.

Given:

Main memory size = 2 GB = 2^31 bytes (since 1 GB = 2^30 bytes)

Cache size = 16 MB = 2^24 bytes

Line size = 32 words = 32 x 4 bytes = 128 bytes

Associativity = 8-way

To calculate the number of sets in the cache:

Number of Sets = Cache Size / (Associativity x Line Size)

Number of Sets = 2^24 bytes / (8 x 128 bytes) = 2^19 sets

To determine the number of bits required for each field of the address:

Byte offset: The byte offset field specifies the byte within a word and requires log2(Word size) bits. Since the word size is 4 bytes, the byte offset field requires log2(4) = 2 bits.

Word index: The word index field identifies the word within a cache line and requires log2(Number of words per line) bits. Since each line contains 32 words, the word index field requires log2(32) = 5 bits.

Set index: The set index field identifies the set within the cache and requires log2(Number of sets) bits. From the calculation above, we have 2^19 sets, so the set index field requires log2(2^19) = 19 bits.

Tag: The tag field identifies the memory block and requires the remaining bits of the address after the byte offset, word index, and set index fields have been determined. Therefore, the tag field requires 32 - 2 - 5 - 19 = 6 bits.

Therefore, the number of bits required for each field of the address are as follows:

Byte offset: 2 bits

Word index: 5 bits

Set index: 19 bits

Tag: 6 bits

Learn more about bits here:

https://brainly.com/question/30791648

#SPJ11

When attempting to prove "for all positive integers n>1, n can be expressed as 2x+3y for some non-negative integers x,y" by the strong form of the Principle of Mathematical Induction, one needs to show that it works in two base cases, n=2 and n=3. In the inductive step, what should the inductive hypothesis be, after declaring that k is an integer greater or equal to 3?
a. Assume, for some integer i between 2 and k, that i can be expressed as 2x+3y for some non-negative integers x,y.
b. Assume k can be expressed as 2x+3y for some non-negative integers x,y.
c. Assume k-1 can be expressed as 2x+3y for some non-negative integers x,y.
d. Assume, for all integers i between 2 and k, that i can be expressed as 2x+3y for some non-negative integers x,y.
e. Assume, for all integers k>1, that k can be expressed as 2x+3y for some non- negative integers x,y.

Answers

The correct answer is option (b): "Assume k can be expressed as 2x+3y for some non-negative integers x,y."

The inductive hypothesis in the inductive step should assume that the given statement holds true for a specific value, which in this case is the positive integer 'k.' By assuming that 'k' can be expressed as 2x+3y for some non-negative integers x and y, we can proceed to prove that the statement holds for the next positive integer, 'k+1.'

In the inductive step of the strong form of the Principle of Mathematical Induction, we assume that the statement holds true for a specific value 'k' (the inductive hypothesis). We then aim to prove that the statement also holds for the next positive integer, 'k+1.'

Option (a) is incorrect because it assumes the statement holds true for some specific integer 'i' between 2 and 'k,' but we need to focus on 'k' itself.

Option (c) is incorrect because it assumes the statement holds true for 'k-1,' which is not the number we want to prove the statement for in the inductive step.

Option (d) is incorrect because it assumes the statement holds true for all integers 'i' between 2 and 'k,' but we are only interested in proving it for 'k' itself.

Option (e) is incorrect because it assumes the statement holds true for all integers 'k' greater than 1, which is too broad and not specific to the inductive step at hand.

Learn more about integers  here:

https://brainly.com/question/490943

#SPJ11

An international information systems architecture specifically includes ________.

Answers

An international information systems architecture specifically includes systems required by organizations to coordinate worldwide. Hence, option A is correct.

What is international information systems?

An international information systems architecture consists of the core information systems required by organizations to coordinate international trade and other operations.

A multinational corporation's management receives information on global company activities using an international information system, which is a computer-based system.

As was already mentioned, UNESCO developed the concept of the National Information System to promote the creation in each country of a clear and coherent program.

Thus, option A is correct.

For more than information about international information systems, click here:

https://brainly.com/question/28199927

#SPJ1

The options are missing-

A.systems required by organizations to coordinate worldwide

B.systems required for an intranet

C.systems applications as a service

D.DDL analysis

E.cloud computing

Using the drop-down menu, identify characteristics of IDEs.
IDE refers to
for writing computer programs.
IDEs are a coordinated
IDEs provide developers with

Answers

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:just took it on edge

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:

PLS HELP!!
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your online education.
Make sure that your paper details clearly the type of game, how it will work, and how the student will progress through the action. Also include how the school or teacher will devise a grading system and the learning objectives of the game. Submit two to three paragraphs.

Answers

Incorporating cutting-edge gaming technology into web-based learning can foster an interactive and stimulating educational encounter. A clever method of attaining this goal is to incorporate immersive virtual reality (VR) games that are in sync with the topic being taught

What is the gaming about?

Tech gaming can enhance online learning by engaging learners interactively. One way to do this is by using immersive VR games that relate to the subject being taught. In a history class, students can time-travel virtually to navigate events and interact with figures.

In this VR game, students complete quests using historical knowledge and critical thinking skills. They may solve historical artifact puzzles or make impactful decisions. Tasks reinforce learning objectives: cause/effect, primary sources, historical context.

Learn more about gaming from

https://brainly.com/question/28031867

#SPJ1

Fill in the blank by selecting the correct option. Ethical codes may not address because they are written quite broadly

Answers

Ethical codes may not address all of organization's ethics because they are written mostly by a task force committee of SHRM members and leaders.

What does codes of ethics address?

A code of ethics are known to have or contains some professional conduct outlines. They are regarded as ethical principles that helps to rule  or monitors decisions and behavior at a firm.

They are known to states the  general ways of how employees should behave in the office , as well as some other guidance for settling issues such as harassment, safety, etc.

Learn more about  Ethical codes  from

https://brainly.com/question/24606527

how would a technician adjust internet explorer (windows 7 and 8) for how much drive space is configured for caching web pages?

Answers

These how technician adjust cache on internet explorer for windows 7 and 8 :

Open the internet explorer then select tools and click on internet option, see the picture below.Click the setting on browsing historyChange to cache size as you desire. The default of internet explorer cache is 250 MBWhat is cache?

Cache is a temporary data saved on your computer in the cache memory. It help you browsing faster and reduce data usage by calling the data from cache memory then adjust it to the current website update. It is important to delete unnecessary cache to maximize your computer storage usage.

Learn more about cache at https://brainly.com/question/6284947

#SPJ4

how would a technician adjust internet explorer (windows 7 and 8) for how much drive space is configured
Other Questions
6. The short-range, detailed planning that focuses on current operations is called functional planning. What is the cost of 3 3/4 pounds of salmon at 14.80 per pound Does the point (-7, 5) satisfy the inequality y > -3/7x +2 A mover pushes a desk 4m across the floor by applying a force of 300n . Find the work done diferencias de la ley de Antonie Lavoisier y Louis Proust Identify the subject, verb, marker word (if their is one) for the section belowJacob went to the store for bread and milk. HELP ME ASAP PLEASEEEEEEEE Two different types of staff work at a halfway house. One group is primarily involved in activities that are custody oriented, whereas the case managers and counselors take care of treatment and rehabilitation. T/F the misty rendering and near formlessness of hasegawa tohaku's pine forest invokes which precept of zen buddhism? the tongue-like flow of water-saturated clay-rich soil on a hillside that breaks away and moves downslope is called . how many minutes is in 8 hours I HAVE GOTTEN THE ANSWERMax made a journey of 700km partly by train and partly by bus.He started his journey at 8.00am. by train which travelled at 50km/hr. After alighting from the train, he took a lunch break of 30 minutes. He then continued his journey by bus which travelled at 75km/hr.The whole journey took 11.75hours. Determine the distance travelled by bus.so this is the answertime taken by the train=xtime taken by the bus=ysubtract 30 minutes from the total time taken..hence x+y=10.75form an equationx+y=10.7550x+75y=700y=6.5756.5=487.5 If there are equal rates of return between assets in two currencies, then there is:_______ PLEASE HELP ME NOW!!!! (NOT FOR BEGINNER)1.What factor increases the likelihood of a landslide occurring? A.lots of waterB.forest fireC.all of the aboveD.over steepening of a hill2. Are landslides be considered a fast or slow geological process?A. Slow, because it takes all winter for the snow to build up.B. Slow, because all of the snow has to melt before a landslide can happen.C. Fast, because rain falls fast.D. Fast because conditions for landslides happen within months, slow processes can take millions of years.3.The average elevation of the Grand Canyon is 2,200 feet above sea level. Which of the following could be an explanation of why there are fossils at the top of the canyon?A. The canyon was once covered by the ocean but the land receded (went down)B. The canyon was covered by the ocean and the water receded (went down).C. It is still part of the ocean, thats why there are marine animals there.D. All of the fossils came from things that lived in the Colorado River.4. Why does the Grand Canyon have layers?A. The uplift of the land caused layers.B. Deposition of sediments over millions of years.C. Erosion by wind has worn away sedimentary rock.D. Erosion by the Colorado River has formed layers. Why do countries in parts of Asia and Africa have short doubling times compared to countries in Europe and North America? Click on the amide bonds in the following peptide that are cleaved selectively under trypsin catalysis. Gln-Pro-Trp-Gly-Arg-Ser-Lys-Val-Met-Leu-Phe-Lys-Ala pls help me with this math problem How has the American conceptof representative governmentchanged over time? with nonprobability methods there is no way to determine the probability even if the population size is known because the: group of answer choices selection technique is subjective selection technique is objective selection technique is uncertain selection technique is non-scientific Which of the following is an example of stage direction?Group of answer choicesAct I. Morning-room in Algernon's flat in Half-Moon Street.[Lane is arranging afternoon tea on the table, and after the music has ceased, Algernon enters.]The room is luxuriously and artistically furnished. The sound of a piano is heard in the adjoining room.Algernon. Did you hear what I was playing, Lane?