Top answers

All subjects
All levels

What are adventages and disadventages of encryption network security?

Network security focused on encryption are strong in raw computer security - the computers can encrypt data fast enough and the encryption is reliable and difficult to break. However, it has its downfalls...

SJ
Answered by Sara J. Computing tutor
1808 Views

What is encapsulation?

Encapsulation is restricting data and actions to object they are defined in. In other words, no other object can access and modify them directly. In Java encapsulation can be achieved by making an object ...

SJ
Answered by Sara J. Computing tutor
2190 Views

What is the range of denary numbers that can be represented using 8-bit two’s complement binary integers?

In the two's complement notation - the first bit is used to display whether a number is positive or negative. This leaves us with 7 bits to work with to signify the magnitude(size of the number). To calcu...

JB
Answered by Juris B. Computing tutor
14140 Views

When a stack is implemented using a 1-D array, adding a valid item can cause an execution error. Explain why an execution error can occur in this situation.

The key thing to remember here is that an array is a fixed size data structure so any attempt to exceed this size will cause an error during execution e.g. trying to add an item to an already full stack w...

TT
Answered by Thomas T. Computing tutor
2207 Views

How do I put 10101011 from binary into decimal?

As with all binary numbers, you can start from the right side. The furthest right place represents the 20 (=1) place. As you move left, the places represent 21, 22, 2...

LG
Answered by Lauren G. Computing tutor
4762 Views

We're here to help

contact us iconContact ustelephone icon+44 (0) 203 773 6020
Facebook logoInstagram logoLinkedIn logo

© MyTutorWeb Ltd 2013–2025

Terms & Conditions|Privacy Policy
Cookie Preferences