What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me

Answers

Answer 1

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

Answer 2

Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.

Ask about the difference between password protection and encryption.

Now, Password protection and encryption serve different purposes when it comes to securing data.

Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.

The password is typically a combination of characters that only authorized users should know.

Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.

The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.

Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key

Hence, Both measures are commonly used together to enhance data security.

To learn more about password protection visit:

https://brainly.com/question/32167725

#SPJ3


Related Questions

1. While researching online, you come across an article that prominently displays the author's name. This source is likely to have
A. timeliness.
B. unreliable sources.
C. authority.
D. a direct citation.

Answers

In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

What is an authority?

This is known to be the power of a person to be able to affect others in form of influence or command them.

Note that based on the above,  In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

Learn more about authority from

https://brainly.com/question/507147

#SPJ1

This information source is likely to have a direct citation.

What is a direct citation?

A direct citation typically occurs when an article or any piece of text contains word-for-word contents directly taken from another author’s, or from a previously published work by the author.

In the case of this online article, since it prominently displays the author's name, the rules of academia put the author of the article under obligation to also make direct citations of word-for-word material gotten from other authors or previous works published by him, otherwise, he could be sanctioned for plagiarism.

You can learn more about direct citations from a related question here https://brainly.com/question/683722

#SPJ1

Attempt?
Natural Subsequence
In Timsort, we try to use the natural sorted subsequence already present in
the array which is to be sorted. The natural sorted sequences are those
array.
which are somehow already present in the sorted order in the provided
Your task is to find the length of the longest natural sorted subsequence
already present in the given string.
Input Specification:
input1: A string containing all lower case letters.
Revisit Later
Output Specification:
Return the length of the longest natural sorted subsequence.
Example 1:
input1: abzd

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that an natural subsequence occurs.

Writting in JAVA:

import java.util.*;

class Main{

static int mn = -2147483648;

public static int longestSeq(String s)

{

int []dp = new int[30];

Arrays.fill(dp, 0);

int N = s.length();

int lis = mn;

for(int i = 0; i < N; i++)

{

 int val = (int)s.charAt(i) - 97;

 int curr = 0;

 for(int j = 0; j < val; j++)

 {

  curr = Math.max(curr, dp[j]);

 }

 curr++;

 lis = Math.max(lis, curr);

 dp[val] = Math.max(dp[val], curr);

}

return lis;

}

public static void main(String[] args)

{

Scanner sc=new Scanner(System.in);

String s=sc.nextLine();

System.out.print(longestSeq(s));

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

what are the three stages of the system development life cycle?​

Answers

Answer:

Explanation:

design ,develop ,testing

A trucking company is expanding its business and recently added 50 new trucks to its fleet delivering to numerous locations. The company is facing some challenges managing the new additions. Which of the company's problems could be solved more easily using quantum computing

Answers

The company's problems that could be solved more easily using quantum computing is commute optimization task.

What is optimization task?

The level or rate of hardness of of the commute optimization task is known to be in the areas

Components processing waiting commuting time

In the case above, Quantum-assistance is one that can helps firms to be able to handle the time issues and to find solutions for the problem above.

Learn more about quantum computing from

https://brainly.com/question/25513082

#SPJ1

Choose 2 statements that correctly describe the time complexity of data structures with N data.

The average time complexity of the data lookup in a hash table is O(N).

The average time complexity of the data lookup in a complete binary tree is O(logN).

The average time complexity of deleting an item from an array is O(1).

The average time complexity of accessing the kth element in a linked list is O(1).

The average time complexity of inserting data into a heap is O(logN)

Answers

The  statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of the data lookup in a hash table is O(N).The average time complexity of inserting data into a heap is O(logN)

What is time complexity of data structures?

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of the data lookup in a hash table is O(N).The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

https://brainly.com/question/17350816

#SPJ1


Which option is designed by software engineers?
A. Programming languages that help computers operate
B. Computer components such as monitors and mice
C. Operating systems that run computers
D. Networks that connect computers

Answers

Answer:

Software engineers make programming languages that help computer operation

Explanation:


Which of the following is not a reason to choose a community college?

Answers

They do not make as big of a impression than a famous university when applying for jobs.

You find a picture of a famous department store online that would be great to include in a project of yours. What should you do before you copy the picture?

Answers

(I'm not a lawyer, I'm not your lawyer, and this isn't legal advice.)

You should ensure you have permission to use the image.

Most commonly, this will happen in one of two forms:

The image already has a free license allowing you to use it. (Generally, this will be a Creative Commons license.) Follow the terms specified and you should be all set!If the image isn't already licensed freely online, you'll need to ask the photographer or publisher for permission to use the image. In this case, a quick email is usually enough to get the ball rolling.

In either case, you should generally have explicit permission from the person who created the picture for you to reuse and share it.

(There are some cases in which "fair use" will apply and you may not need permission from the copyright owner, but this varies on a case-by-case basis. I encourage you to do your research on that area if needed.)

how can we search person in brainly for sending request of friend

Answers

Answer:

The method what I used thast the person what you would like to add make them make a question then find the question by searching it up or looking in the 'answer questions' category. After that answer the question or just write anny thing in the question. Let your friend comment or interact with the answer them click on there profile and add. If you what them to add you back they will have to go on there profile and then go to there followers and click add back.

(Hope I helped)

Select the four tactics that cyber criminals use for stealing information from the list below.
baiting
click-jacking
Ospamming
defamation
cross-site scripting
Opharming
Mark this and return

Answers

Baiting clickjacking pharming spamming

What are the key constructs of a G&T Value Delivery objective?

Excelling in customer mindshare
Delivering business value
Delivering an innovative solution
Aligning to contractual commitments

Answers

Explanation:

delivering business value

What is necessary to execute a Python program?

Answers

A Python interpreter and typically a collection of modules must be installed on the computer system in order for Python programs to work.

What is a python language?

Python is a general-purpose, high-level, interpreted programming language. Code readability is prioritized in its design philosophy, which makes heavy use of indentation.

Python is a language for writing source code, not binary code. You can (usually must) build obj files for C or C++ and link them into an executable after that. The C/C++ executable is a sourceless binary executable file.

The Python compiler/interpreter, on the other hand, executes Python source code directly. Naturally, the procedure itself is more intricate behind the scenes. However, the Python compiler/interpreter really runs the source from the user's perspective.

Learn more about the Python program:

https://brainly.com/question/15385804

#SPJ1

Write five importanceof saving a file.​

Answers

Explanation:

number 1 it will be safe for future use number 2 it helps in our rest of the work

number 3 saving a file is a very good habit number for importance of saving file are a very very nice number 5 I hope it help please give me your ratings and like and also don't forget to read the brainly.com

The Linux tail command prints the last maximum n lines of a file. When writing a function that performs this function, choose the correct statements that can go in the ?????.



lines[-n]

lines[-n:]

lines[len(lines)-n:]

lines[-1:-n-1:-1]

lines.pop(n)

Answers

In writing a function that performs this function, the right statements that can go in the is lines[-n:] .

What tail command is seen in Linux?

Linux tail command is known to be a form of command that is used to show the last ten lines of one or a lot of files.

Note that Its key aim is to read the error message and as such In writing a function that performs this function, the right statements that can go in the is lines[-n:] .

Learn more about Linux  command  from

https://brainly.com/question/24822807

#SPJ1

You see someone getting harassed online but decide to ignore it. You are a/an

Answers

If you see someone getting harassed online but decide to ignore it, then that person is a Bystander.

Who is a bystander?

A  bystander is known to be any body that is said to be   present at an event or incidence but they are said to be not involved in it.

Hence, If you see someone getting harassed online but decide to ignore it, then that person is a Bystander.

Learn more about Bystander from

https://brainly.com/question/3520355

#SPJ1

Which of the following can be called a form of discriminant analysis?

Answers

Decision tree can be called a form of discriminant analysis.

What do you mean by Analysis?

Analyzing something entails dissecting it into its component parts and then coming to your own conclusions by asking questions like WHY and HOW.

Based on results from one or more quantitative predictor variables, observations are divided into non-overlapping groups using the statistical approach known as discriminant analysis. A clinician could, for instance, use a discriminant analysis to find patients with high or low stroke risk.

Discriminant analysis is a regression-based statistical technique used to identify the category or group to which a piece of data or an object belongs based on its traits or distinguishing characteristics.

Therefore, Decision tree can be called a form of discriminant analysis.

Learn more about Analysis, here;

https://brainly.com/question/5040600

#SPJ6

Test your knowledge: Learning more about project manager rol
responsibilities
Total points 4
1. Fill in the blank:
is how a project manager makes use of productivity tools and creates processes. The
project manager may need to use certain tools and processes to do tasks like create a schedule and share
information.
Managing tasks
Removing unforeseen barriers
Budgeting and controlling costs
O Planning and organizing

Answers

Answer:

planning and organizing

Explanation:

I guess that's what project manager do



Select the WRONG statement about Slide Transitions.

a. Slide transitions can be considered a different type of animation.

b. Each and every slide in PowerPoint should have a slide transition.

c. You can apply slide transitions to only a few selected slides.

d. You can apply slide transitions to every slide in a presentation

Answers

Answer:

c. You can apply slide transitions to only a few selected slides.

Explanation:

If you want to, you could literally apply slide transitions to every slide.

C

You can apply slide transitions to any amount of slides you wanted

You are seeing multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first? Second?a. Restore the SYSTEM hive from backup.
b. Restore the SAM hive from backup.
c. Perform a startup repair.
d. Perform a Windows 10 reset.

Answers

Answer
C. Perform a startup repair.

Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There are still people in the world who do not have access to the internet. C. Technology can be used to create economic inequality. D. Net neutrality seeks to ensure that everyone gets equal access to the internet

Answers

The false statement in the options is : ( A ) The internet has developed at a consistent rate throughout the world

Development rate of the internet

The internet have not developed at a consistent rate throughout the world rather it is has developed at an exponential rate in certain parts of the world, hence the statement is false. there are still people in the world who do not have access to the internet either through bad government policies or unaffordability of the the internet services.

Net neutrality ensures that everyone has an equal access to the internet at the same charges. also Technology can be used to create economic inequality through innovators.

Hence we can conclude that The false statement in the options is : ( A ) The internet has developed at a consistent rate throughout the world

Learn more about the positive effect of the  internet : https://brainly.com/question/11598429

#SPJ1

13. You're doing research for a paper. When would you use an indirect citation?
A. You don't like something an author wrote and decide not to use it at all.
B. You need to list all of the books and articles you read for your research paper.
C. You like something an author wrote so you copy and paste it directly into your paper.
D. You like something an author wrote but want to rewrite it in your own words.

Answers

Answer:

D

Explanation:

d is the answer

What did you learn about your creative skills when you made the mask or face shield?

Answers

The thing that I have learn about your creative skills when you made the mask or face shield is that by making those shield, i will be able to enhance my creative side.

What do you learn when you create a mask?

In course of the making of a mask and its activity, students are known to be able to learn that they one can have the ability to be able to conceal or reveal some areas of their identity.

Therefore, The thing that I have learn about your creative skills when you made the mask or face shield is that by making those shield, i will be able to enhance my creative side.

Learn more about creative side from

https://brainly.com/question/11657088

#SPJ1

Answer:Louis C.K. had a great bit a decade ago where he mocked complaints about air travel by pointing out how much better we have it than our ancestors did. New York – LA in six hours? It used to take 30 years. People would die. They’d be entirely different people by the time they arrived.

Explanation:

Select 3 true statements about Python class.

If a class inherits from multiple classes, the order of inheritance does not matter.

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute exists as a unique object regardless of how many instances of the class are.

A class attribute can be used without an instance of that class.

Properties whose names start with _ (e.g. _name) are private properties and cannot be accessed outside of the corresponding class.

Answers

The true statement is that (In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute can be used without an instance of that class.A class attribute exists as a unique object regardless of how many instances of the class are.

Do all classes in Python inherit from object?

All classes in Python are known to have objects of the type class, and this is said to be a Metaclass.

Note that Each class in Python, by setting,  often take in from the object base class.

Learn more about Python  from

https://brainly.com/question/26497128

#SPJ1

The Horse table has the following columns:

ID - integer, primary key
RegisteredName - variable-length string
Breed - variable-length string
Height - decimal number
BirthDate - date
Write a SELECT statement to select the registered name, height, and birth date for only horses that have a height between 15.0 and 16.0 (inclusive) or have a birth date on or after January 1, 2020.

Answers

The way to write the select statement has been written below.

How to write the query

The query that is going to be written in this statement would be

First use the select command and then add the variables that are of interest.

This would be written as

SELECT

RegisteredName,

Height,

BirthDate

Next you have to specify where you want the select statement to read from so you write

FROM horse

WHERE height BETWEEN  15.0 and 16.0 OR BIRTHDATE  >='2020-01-01'.

The query that is written above if followed would show the data that the operator is seeking for.

Read more on python select statements here:

https://brainly.com/question/14350111

#SPJ1

he Barking Lot is a dog day care center. Design a flowchart or pseudocode for the following:

a. A program that accepts data for an ID number of a dog's owner, and the name, breed, age, and weight of the dog. Display a bill containing all the input data as well as the weekly day care fee, which is $55 for dogs weighing less than 15 pounds, $75 for dogs from 15 to 30 pounds inclusive, $105 for dogs from 31 to 80 pounds inclusive, and $125 for dogs weighing more than 80 pounds.

b. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for each dog.

c. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for dog owners who owe more than $100.

d. A program that continuously accepts dogs' data until a sentinel value is entered, and displays billing data for dogs that weigh less than 20 pounds or more than 100 pounds.

Answers

Explanation:

The Barking Lot is a dog day care center. Design a flowchart or pseudocode for the following:

a. A program that accepts data for an ID number of a dog’s owner, and the name, breed, age, and weight of the dog. Display a bill containing all the input data as well as the weekly day care fee, which is $55 for dogs under 15 pounds, $75 for dogs from 15 to 30 pounds inclusive, $105 for dogs from 31 to 80 pounds inclusive, and $125 for dogs over 80 pounds.

b. A program that continuously accepts dogs’ data until a sentinel value is entered, and displays billing data for each dog.

c. A program that continuously accepts dogs’ data until a sentinel value is entered, and displays billing data for dog owners who owe more than $100.

Step-by-step solution

100% (7 ratings) for this solution

Step 1 of 5

a) Pseudocode : Code inputs complete data of dog and displays the total amount spend by owner for dog maintenance depending on weight of dog.

start

Declarations

num IDnumber

num age

num weight

num totalbill

string name

string breed

housekeeping()

detailLoop()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output ” Enter dog name”

input name

output ”Enter breed”

input breed

output ”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else

if weight >=15 AND weight <=30 then

totalbill = 75

else

if weight >=31 AND weight <=80 then

totalbill = 105

else

if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $ ”,totalbill

retrun

Flowchart:

Detailed loop defines the total bill for dog and displays dog’s information.

b) Pseudocode : Displays total bill and complete details of dog.

start

Declartions

num IDnumber

num age

num weight

num totalbill

string name

string breed

while IDnumber <> 0

housekeeping()

endwhile

detailLoop()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output” Enter dog name”

input name

output”Enter breed”

input breed

output”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else

if weight >=15 AND weight <=30 then

totalbill = 75

else

if weight >=31 AND weight <=80 then

totalbill = 105

else

if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $ ”,totalbill

retrun

Detailed loop defines the total bill for dog and displays dog’s information.

c) Pseudocode : Code displays all dog’s owners details having bill more than $100.

start

Declartions

num IDnumber

num age

num weight

num totalbill

string name

string breed

while IDnumber < > 0

housekeeping()

endwhile

detailLoop()

display()

stop

housekeeping()

output “ Enter ID number of dog owner”

input IDnumber

output ” Enter dog name”

input name

output ”Enter breed”

input breed

output ”Enter age”

input age

output “Enter weight in pounds”

input weight

return

detailLoop()

if weight > 15 then

totalbill = 55

else if weight >=15 AND weight <=30 then

totalbill = 75

else if weight >=31 AND weight <=80 then

totalbill = 105

else if weight > 80

totalbill = 125

endif

endif

endif

endif

output “ The weekly bill is $”,totalbill

retrun

display()

if totalbill > 100 then

output<<”More than $100 owners are”, IDnumber

return

Take values of length and breadth of a rectangle from the user and check if it is square or not.

Answers

The program is a conditional program, and it requires an if statement

The program in Python

The complete program written in Python is as follows:

length = int(input("Length: "))

width = int(input("Width: "))

if length == width:

  print("Square")

else:

  print("Rectangle")

Read more about Python programs at:

https://brainly.com/question/24833629

#SPJ1

Answer:

Since someone else answered in python, I will answer in c++

The complete program written in C++ is as follows:

int length;

int width;

cout << "Length: ";

cin >> length;

cout << "Width: ";

cin >> width;

if (length == width) {

 cout << "Square";

} else {

 cout << "Rectangle";

}

. Choose 2 statements that correctly describe the time complexity of data structures with N data.

Answers

The 2 statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of data structures with N data is O(N). The average time complexity of inserting data into a heap is O(logN).

What is Time Complexity?

This is known to be the idea in computer science that handles  the quantification of the needed time frame that is taken by a set of code or algorithm to act or run as a function of the numbers of input.

Note that The 2 statements that correctly describe the time complexity of data structures with N data are:

The average time complexity of data structures with N data is O(N). The average time complexity of inserting data into a heap is O(logN).

See full question below

. Choose 2 statements that correctly describe the time complexity of data structures with N data. The average time complexity of the data lookup in a hash table is O(N). The average time complexity of the data lookup in a complete binary tree is O(logN). The average time complexity of deleting an item from an array is 0(1). The average time complexity of accessing the kth element in a linked list is 0(1). The average time complexity of inserting data into a heap is O(logN)

Learn more about Data structures from

https://brainly.com/question/24268720

#SPJ1


Write a program that prints out a list of the integers from 1 to 20 and their
squares. The output should look like this:
1-1
2-4
3-9
20-400

Answers

Answer:

for x in range(1,20):

   print(f'{x}-{(x**2)}')

Write an algorithm that describes the second part of the process of making change (counting out the coins and bills).

Answers

An Algorithm that describes the second part of the process can be written as listed below :

Algorithm describing the second part of the process of making change (counting out the coins and bills )

First step : Initialize the required variables to zero to determine the number of coins and bills.

Second step : Prompt and read the amount to convert. amount to Hundreds

Third step : Compute hundred bill note as 100 amount equal to  ( amount% * 100 fifties - amount )

Fourth step : Compute fifty bill notes as :  ( amount% * 50 fifty bill notes )

Fifth Step : Compute Twenty bill notes as amount equal to ( amount% *20 Twenties - amount )

Sixth Step : Compute Tens bill notes as : ( amount% * 10 Tens bill notes )

Note : continue the process for fives, Quarters, Dimes, Nickels, and Pennies.

Learn more about Algorithm : https://brainly.com/question/13800096

#SPJ1

Attached below is the missing part of the question

Write an algorithm that describes the second part of the process of making change (counting...

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
type of app should he launch?

Answers

He should launch an M-commerce app
Other Questions
A caption for a cooking competition does the person who's going to make your uniform need your height? Select the correct answer.A triangular tabletop has the given dimensions. Vinyl is placed around the outer edges of the tabletop.3 ft4545What is the approximate length of vinyl needed for the outer edges of the tabletop?OA.OB.OC.O D.10.2 ft14.2 ft9 ft11.2 ft Which of the following represents a function?Please help Alyssa's favorite tennis team has 8 players on them. She has taken a picture with every single athlete individually and wants to post some of the pictures on her wall. But she only wants to post 3 pictures on her wall. How many different sets of pictures can she post on her wall Explain the importance of social rule for the development of a society Which of the following is a defense to a charge of trademark infringement? Group of answer choices There is a good chance of the public being confused. The mark is distinctive. The statutory period protecting the trademark has expired. The mark or symbol is considerably different. The use is a "fair use." Triangle L M Q is cut by perpendicular bisector L N. Angle N L Q is 32 degrees and angle L M N is 58 degrees.Is TriangleMNL TriangleQNL? Why or why not?Yes, they are congruent by either ASA or AAS.Yes, they are both right triangles.No, AngleM is not congruent to AngleNLQ.No, there are no congruent sides. What contribution to geometry is attributed to the work of Ren Descartes? 27.Make an orthographic drawing with top, left, front, and right side view of the model below.front right To conduct a survey on current social work majors, a researcher gets a list of all students who have declared a social work major from the registrar from which a sample will be drawn. This list is known as a (n): Element Z has the following properties: a. silvery-white solid at room temperature b. malleable c. used as a catalyst d. conducts electricity Given the following rectangle and circle, what appropriate value of x are the two areas equal? A: x= 3.4 B: x=5.8 C: x= 10.2 D: the curves do not intersect, so there is no solution Why were the anabaptists persecuted during the counter reformation The length of a picture is 10.5cm and the diagonal is 18.2cm . What width must have to meet a right angle ? If a post-synaptic ionotropic receptor is permeable to potassium and assuming all normal ionic distributions, the response in the post synaptic cell will be... Jennys family is traveling on a long road trip. The first day they traveled 11,405.59 yards. On the second day they traveled 12,048.82 yards. On the third day they traveled 9,014 yards. How many yards did they travel during the 3 day road trip? A crate with a mass of M = 62.5 kg is suspended by a rope from the endpoint of a uniform boom. The boom has a mass of m = 116 kg and a length of l = 7.65 m. The midpoint of the boom is supported by another rope which is horizontal and is attached to the wall as shown in the figure.1. The boom makes an angle of = 57.7 with the vertical wall. Calculate the tension in the vertical rope.2. What is the tension in the horizontal rope? Assume both Paul and Cliff divide their time equally between the production of corn and wheat, and they do not trade. If they are the only producers of wheat and corn, then total production of wheat and corn is 2c+2b in standard from