What is the number of key pairs that could be correct if we know or suspect only one plaintext-ciphertext pair

Answers

Answer 1

If we know or suspect only one plaintext-ciphertext pair in a cryptographic system, the number of key pairs that could be correct is infinite.

In cryptography, the goal of encryption is to transform plaintext into ciphertext using a secret key in such a way that the original message cannot be recovered without knowledge of the key. However, if an attacker knows or suspects the plaintext and ciphertext for a particular message, they can use this information to generate a list of possible keys that could have been used to encrypt the message.

In some cases, this list may be limited to a small number of possible keys, especially if the encryption algorithm or key size is weak. However, in general, the number of possible keys is extremely large, and it is often impractical or impossible to enumerate them all.

Therefore, it is important to use strong encryption algorithms and key sizes to ensure that even if an attacker knows or suspects a plaintext-ciphertext pair, they cannot easily determine the key used to encrypt the message. Additionally, other security measures such as key management and secure key exchange protocols can help to further protect encrypted data from attacks.

To know more about cryptography, click here:

https://brainly.com/question/88001

#SPJ11  


Related Questions

Conclusion for primary memory

Answers

Answer:

primary memory is also called main memory and also it stores information in the computer

Explanation:

why the data type for zipcode is char and not smallint or integer. would it be best to create the field with a length of 5? 9? 10? why or why not?

Answers

Zipcodes are typically stored as character or string types, such as char or varchar, rather than numeric types because they serve as identifiers rather than mathematical values. The standard length for a US zipcode is 5 digits, but a slightly larger length, such as 6 or 7, may be used to allow for the possibility of longer zipcodes in the future or to accommodate postal codes from other countries. A field length of 9 or 10 may be appropriate if storing both US and international postal codes in the same field. Using a character type and appropriate field length ensures that zipcodes are stored accurately and can be easily retrieved when needed.

To know more about zipcode click here:

brainly.com/question/32075275

#SPJ11

your friend is a software developer. they have windows 10 pro installed on their soho computer. they are creating an application that needs to run smoothly on both windows and linux machines, so it will need to be tested in both of those environments. what would be the best solution for your friend? group of answer choices windows 10 sandbox two separate machines dual-boot system virtual machines on their pc

Answers

Windows Sandbox offers a simple desktop setting for isolating apps safely. The software that is installed inside the Windows Sandbox environment remains "sandboxed" and operates independently from the host computer.

What is Sandbox Windows 10?To run apps securely and separately, Windows Sandbox offers a simple desktop environment. The software that is installed in the Windows Sandbox environment is kept "sandboxed" and operates independently of the host computer.A sandbox is a short-term solution. All of the program's data, state information, and software are erased when it is closed. Every time you open the application, you get a fresh instance of the sandbox. Notably, starting of Windows 11 Build 22509, your data will survive a restart initiated from inside the virtualized environment—useful for installing apps that call for the OS to reload.The sandbox does not have direct access to any of the host's software or apps. You must explicitly install any particular programs you require to run inside the Windows Sandbox environment.The qualities of Windows Sandbox include:All necessary components are part of Windows 10 Pro and Enterprise, which are both versions of this feature. Downloading a VHD is not required.Windows Sandbox is always as spotless as a fresh installation of Windows.Nothing on the device is durable and is hence disposable. Whenever a user closes an application, everything is deleted.Kernel isolation is protected via hardware-based virtualization. In order to isolate Windows Sandbox from the host, it depends on the Microsoft hypervisor, which runs a separate kernel.Utilizes a virtual GPU, sophisticated memory management, and an integrated kernel scheduler to be efficient.

To Learn more About Windows Sandbox  refer to:

https://brainly.com/question/12921009

#SPJ4

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

assignee

Explanation:

advantage of computer

Answers

Explanation:

Computers help increase user productivity, and users become more productive at everything you do on the software running on the computer with a good understanding. For instance, when you have work on an Excel worksheet with a basic understanding, you can create, edit, delete, store, calculation, and print documents and letters. With all pre-existing technologies, all of these things were either impossible or much slower.One of the most useful advantages of computers is able to store and access vast amounts of data, which can be retrieved in the future. For example, a computer system and devices like eBook readers have enough storage capacity as they can store hundreds or thousands of books. Also, you can store movies, pictures, songs digitally, and documents on the computer, and can quickly find data accordingly and share information between devices. It reduces plastics and paper requirements that are used to make non-digital versions of the media.A computer has the ability to connect you to the network or the Internet. Once you connected, you can search for any type of information and can download audio, video, movies, documents, and more.Computers help you to connect with your friend, family, or other relatives with long-distance through e-mail and social networking.


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

explain when access is an appropriate choice as a dbms and when an enterprise-level dbms system would be more appropriate.

Answers

Access is an appropriate choice as a DBMS for small-scale, single-user applications, while an enterprise-level DBMS system is more appropriate for large-scale, multi-user environments.

Access, as a DBMS, is suitable for small-scale applications where the data volume and user concurrency are relatively low. It is often used by individuals or small businesses to manage and organize data. Access provides an easy-to-use interface and allows for quick development of simple databases. It is particularly useful when the number of users accessing the database is limited, and the data storage requirements are not extensive.

On the other hand, enterprise-level DBMS systems are designed to handle large-scale, complex databases with high volumes of data and multiple concurrent users. These systems offer advanced features such as data partitioning, replication, and distributed computing capabilities, which enable efficient management and processing of large amounts of data. Enterprise-level DBMS systems also provide robust security mechanisms to ensure data integrity and protect against unauthorized access. They are suitable for organizations that require scalability, performance, and reliability in handling their data operations.

In summary, Access is appropriate for small-scale, single-user applications that require a simple and easy-to-use DBMS solution, while an enterprise-level DBMS system is more suitable for large-scale, multi-user environments with complex data management needs.

Learn more about enterprise-level DBMS system

brainly.com/question/33888330

#SPJ11

Online interaction with social media platforms:__________.
i. Social Engine Optimization
ii. Testimonials
iii. Social Media Presence

Answers

Answer:

social media precense is your answer

Which statement describes a possible cause of algorithmic bias?
A. An algorithm miscalculates the data that is entered and doesn't
filter out unwanted data.
B. A programmer writes his own worldview into an algorithm,
privileging one group of users over others.
C. There is a shortage of good algorithms to solve complex problems
or issues.
D. A programmer fails to analyze the problem fully and break it down
into smaller parts.

Answers

The statement which best describes a possible cause of algorithmic bias is that a programmer fails to analyze the problem fully and breaks it down into smaller parts. Thus, the correct option for this question is D.

What is Algorithm bias?

Algorithm bias may be defined as systematic and repeatable errors in a computer system that significantly construct unfair outcomes in a given set of instructions by the user.

There are three main causes of algorithmic bias: input bias, training bias, and programming bias. Algorithmic outcomes oftentimes labeled as “biased” may simply reflect unpleasant facts based on causal relationships derived from reliable representative data.

Therefore, a programmer fails to analyze the problem fully and break it down into smaller parts is the statement that best describes a possible cause of algorithmic bias.

To learn more about Algorithm bias, refer to the link:

https://brainly.com/question/29523555

#SPJ1

Tonya wants to group some messages in his inbox. What are some of the ways that she can do this? Check all that apply. assign messages a color-coded category. Create a rule to move messages to a new folder. Create a new folder, select/ highlight messages, right-click, and choose Move to folder. Highlight messages, right-click, and choose Group Messages.

Tonya wants to group some messages in his inbox. What are some of the ways that she can do this? Check

Answers

Answer: Create a new folder, select/highlight messages, right-click, and choose group messages.

Explanation: answer above!

Tonya wants to group some messages in his inbox. Some ways that she can do this are:

Assign messages to a color-coded category. Create a rule to move messages to a new folder.To create a new folder, select/highlight messages, right-click, and choose group messages.

What is organizing massages?

A list of folders can be found in the left-side menu of Messages. Click the New Folder button under My Folders. A new window with the title "Create New Folder" will open. In the text box, type the name you want for the new folder.

Touch Conversation categories > Add category, then tap Done to create a category. To view the newly added tab or label, return to the app's home screen. Tap Conversation categories to rename a category. Rename can be selected in the bottom men after selecting the desired category.

Therefore, the correct options are A, B, and C.

To learn more about organizing massages, refer to the link:

https://brainly.com/question/28212253

#SPJ2

Jeson will download a file of 10 MB, he has internet plans of 10 Mbps speed. How much total time does Jeson require to download his 10 MB file in his computer, explain your answer.

Answers

Answer:

8 seconds

Explanation:

8 Mbps (Megabit / sec) = 1 MBps (Megabyte / sec)

Therefore 10 Mbps = 1.25 MBps

Now divide the file 10MB by his download speed of 10Mbps (which is 1.25 MBps) and you can get 8 seconds.

Answer:

8 seconds

Explanation:

8 Mbps (Megabit / sec) = 1 MBps (Megabyte / sec)

Therefore 10 Mbps = 1.25 MBps

Now divide the file 10MB by his download speed of 10Mbps (which is 1.25 MBps) and you can get 8 seconds.

what is a technology that exists inside another device called

Answers

Answer: embedded technology

Explanation: just took the test

Answer:

A

Explanation:

Embedded technology

Recently, there has been an increase in people buying wireless headphones. These headphones usually contain sealed batteries and connect to devices via Bluetooth.


Discuss the impact of people changing to wireless headphones.


In your answer, you might consider the impact on:


Ethical issues


Cultural issues


Environmental issues

Answers

The shift to wireless headphones has various implications on ethical, cultural, and environmental aspects. the transition to wireless headphones brings about ethical, cultural, and environmental considerations that must be carefully weighed by manufacturers, consumers, and policymakers.



1. Ethically, wireless headphones promote a throwaway culture due to their sealed batteries, which are difficult to replace. This may contribute to increased electronic waste when the battery degrades, and the headphones become unusable. Additionally, manufacturers may face ethical dilemmas in sourcing materials and labor for producing these devices.

2. Culturally, the widespread adoption of wireless headphones signals a shift in consumer preferences and technological advancements. This trend highlights society's increasing reliance on wireless technology and portability. As more people embrace wireless headphones, it may impact the way individuals interact in public spaces and their engagement with ambient sounds and conversations.

3. Environmentally, the production, use, and disposal of wireless headphones can have significant consequences. Manufacturing these devices consumes resources and energy, which contributes to the carbon footprint. The sealed batteries, often made of lithium-ion, pose disposal challenges and potential environmental hazards if not recycled properly.


Learn more about wireless; https://brainly.com/question/25633298

#SPJ11

Name the different views in word​

Answers

Answer:

Print Layout, Full-Screen Reading, Web Layout, Outline, and Draft are 5 different views in Word.

Hope this helps!

i have added a new scsi drive to the system, what command will tell the operating system i have plugged in a new drive?

Answers

The command to tell the operating system that a new SCSI drive has been added is rescan-scsi-bus.

SCSI stands for Small Computer System Interface, which is a type of computer bus used to attach peripheral devices to a computer system. SCSI is a set of standards for physically connecting and transferring data between computers and peripheral devices. It is commonly used for hard disk drives, optical drives, tape drives, scanners, and other storage devices.

Rescan-scsi-bus.sh is a command used in Linux to scan the SCSI bus and look for new devices. When a new device is detected, the command notifies the operating system so that it can be properly configured and used by the system. The rescan-scsi-bus.sh command is typically used when a new device is added to the system, such as a new hard drive or tape drive.

Know more about SCSI drive, here:

https://brainly.com/question/30115560

#SPJ11

Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following questions.

There is a person in the database with the last name Olivero. What is that person’s first name?

Jose

Inez

Jack

Sara

Answers

Answer:

SARA

Explanation:

Answer:

The second part question answer is : 1179 Angel Way

Explanation:

1179 Angel Way

which billing model is based on the packaging of computing resources (computation and storage)and the amount of those resources used?

Answers

The most popular IT service model right now is utility computing. It offers infrastructure based on the pay-per-use model and on-demand computing resources.

Which model includes the unique services that customers can access on a cloud computing platform?

A cloud computing service called "software as a service" (SaaS) gives customers access to a vendor's cloud-based applications. Applications are not installed by users on their local devices. The programs are instead located on a distant cloud network that may be accessed via the web or an API.

Which of the following cloud computing models includes an operating system as well?

PaaS. IaaS can be complemented by merging it with PaaS and SaaS, which are two more cloud computing platforms. Because providers host, administer, and provide operating systems, middleware, and other services in addition to the core infrastructure components, PaaS builds on the IaaS paradigm.

to know more about computing resources here:

brainly.com/question/8818658

#SPJ4

can we save 2 MS Word documents with same names.​

Answers

Answer:

No, they have different names

Explanation:

The only way to have two rocuments with the same name is if you are creating a dublicate document.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

What is a recent innovation in edge computing enhanced by 5G?.

Answers

A recent innovation in edge computing enhanced by 5G is placing computing resources physically inside the network infrastructure.

5G is the fifth generation of mobile communications operating on the basis of telecommunication standards, following the existing 4G.

5G technologies must provide higher bandwidth than 4G technologies, which will ensure greater availability of mobile broadband, as well as the use of device-to-device modes (direct connection between subscribers).

It also allows ultra-reliable large-scale systems communication between devices, as well as less latency, higher speed, and less battery power consumption than 4G equipment.

Learn more about computers in https://brainly.com/question/24836371

¿Cuántos motores tiene el Toyota Prius y que características poseen?

Answers

Answer:

yo no se busca en gogle amiga

What elements collect input?
What items display output?
Do you think there are elements that can do both?

Answers

Answer:

input devices : keyboard, touch , mouse

output devices : microphone monitor, printer

Cameras and Modem can be both output and input.

If a chapter activity achieves the goals related to the leadership development category of the program of work, what is the activity likely doing?

Answers

The  activity that it is likely doing is Promoting the SkillsUSA chapter programs and career and technical education

What is the leadership  about?

If a chapter activity achieves the goals related to the leadership development category of the program of work, the activity is likely fostering the development of leadership skills and abilities in participants.

Therefore, By focusing on leadership development, the activity is likely helping participants understand the importance of leadership, build self-awareness, and gain the skills and experiences they need to be effective leaders. This can ultimately help strengthen the chapter, build a more engaged and effective membership, and foster a culture of leadership and continuous improvement.

Learn more about leadership  from

https://brainly.com/question/12522775

#SPJ1

Which statement about assembly-line design is false? Choose all that apply. - Assembly line products have low variety. - Assembly line services have high variety. - Assembly lines have low volumes of output. - The goal of an assembly line layout is to arrange workers in the sequence that operations need. Which statement regarding assembly-line balancing is true? Choose all that apply. - Assembly-line balancing is not a strategic decision. - Assembly-line balancing requires information about assembly tasks and task times. - Assembly-line balancing requires information about precedence relationships among assembly tasks. - Assembly-line balancing cannot be used to redesign assembly lines.

Answers

Assembly line design is a strategy used to streamline manufacturing processes by breaking down tasks into simple and repeatable steps performed by employees. The objective of assembly line design is to establish an efficient flow of work that promotes productivity, reduces waste, and maximizes profits.

Below are the false statements about assembly-line design:

Assembly line products have low variety.Assembly line services have high variety.Assembly lines have low volumes of output. (False)

The goal of an assembly line layout is to arrange workers in the sequence that operations need.Here are the true statements regarding assembly-line balancing:

Assembly-line balancing requires information about assembly tasks and task times.Assembly-line balancing requires information about precedence relationships among assembly tasks.Assembly-line balancing cannot be used to redesign assembly lines. (False)

Assembly-line balancing is a strategic decision that entails dividing the assembly process into smaller units, assigning specific tasks to individual workers, and ensuring that each employee's tasks are consistent with their abilities and skills.

Task times and task relationships are crucial in assembly-line balancing, as the objective is to optimize production while minimizing downtime, labor, and equipment usage.

Learn more about streamline at

https://brainly.com/question/32658458

#SPJ11

write a program that reads a 1xn matrix a and an nxn matrix b from input and outputs the 1xn matrix product, c. n can be of any size >

Answers

Here is a program that reads a 1xn matrix 'a' and an nxn matrix 'b' from input and outputs the 1xn matrix product 'c':

```python

import numpy as np

n = int(input("Enter the size of n: "))

a = np.array(list(map(int, input("Enter the elements of the 1xn matrix 'a': ").split())))

b = np.array([list(map(int, input(f"Enter the elements of row {i+1} of the nxn matrix 'b': ").split())) for i in range(n)])

c = np.dot(a, b)

print("The product matrix 'c' is:")

print(c)

```

The provided program solves the problem by utilizing the NumPy library in Python. It begins by taking input for the size of the matrix 'n', representing the number of columns in matrix 'b' and the size of matrix 'a'. Then, it reads the elements of the 1xn matrix 'a' from the input using the `input()` function and converts them into a NumPy array.

Next, it reads the elements of the nxn matrix 'b' row by row using a nested list comprehension. Each row is inputted separately, and the elements of each row are split, converted to integers, and collected into a list. This process is repeated 'n' times to form the complete matrix 'b'.

After obtaining both matrices 'a' and 'b', the program uses the `np.dot()` function from NumPy to perform matrix multiplication between 'a' and 'b'. This function calculates the dot product between the arrays, resulting in the desired 1xn matrix 'c'.

Finally, the program prints the product matrix 'c' as the output.

Learn more about matrix

brainly.com/question/29132693

#SPJ11

Which of the following statement about big data is correct? a. Analyzing big data is an easy task. b. Big data is important because marketers today need more information to make good decisions. c. Big data actually refers to very small data sets.
d. One result of big data is that marketing managers are often overloaded and overwhelmed with information

Answers

The statement about big data that is correct is "One result of big data is that marketing managers are often overloaded and overwhelmed with information." The correct answer is option d.

Big data is a term that refers to a collection of data sets that are large and complex. It is an extremely important resource for businesses to be able to gather information and make informed decisions. As big data sets become more prevalent, so too do the challenges that come with it, which often makes it difficult for marketing managers to handle the huge amount of data being produced and analyzed. The correct statement about big data is "One result of big data is that marketing managers are often overloaded and overwhelmed with information." In conclusion, the answer is d. One result of big data is that marketing managers are often overloaded and overwhelmed with information.

To learn more about information, visit:

https://brainly.com/question/30350623

#SPJ11

The rate of technological development is

Answers

Answer:

The systematic use of scientific, technical, economic and commercial knowledge to meet specific business objectives or requirements.

Explanation:

which part of the word application window should the user go to for "read the document"

Answers

Answer:

idk

Explanation:

What is the output of this line of code? print(3**3) A. 6 B. 9 C. 27 D. 3

Answers

Answer:

C. 27

Explanation:

The output of this line of code is :

print(3**3) = 27

The reason for this is that ** is the operator for exponentiation, it raises the number on the left to the power of the number on the right.

So 3**3 means 3 raised to the power of 3 which is equal to 27.

Therefore the output will be C. 27

Other Questions
The growth rate of a given species of microorganism is dependent on the composition of the medium in which it is grown. (T/F) Marco is buying a new skateboard that is on sale for 25% off the regular price is 59.95 Marco knows there's a 7% sales tax what is the total amount he should pay including tax Which expression is equivalent to 8+w+5w? Your friend tells you that last night, they saw Mars high in the sky at midnight. You conclude thatA) Mars must be in retrograde.B) your friend must be mistaken: Mars can never be seen at midnight.C) Mars must be at its farthest distance from the Earth.D) Mars must be at its closest distance from the Sun. Explain one possible stakeholders conflictthat could exist between employeesand owners of a business (3 Mark) Given the toolkit function f(x) = x, graph g(x) = -f(x) and h(x) = f(-x). Take note of any surprising behavior for these functions. when a person owes an unconditional duty to another, then he/she must perform it unless the performance is excused. group startstrue or falsetrue, unselectedfalse, unselected An mRNA sequence reads: GAA/GCU/AUA/CUA/UGU. What would the effect on the amino acid be if the second codon read GCA instead, and the third codon read AAU ?A) Silent mutation on both, no changes whatsoever.B) Silent mutation on second codon, third amino acid changed from PHE to STOPC) Silent mutation on AAU only. Third amino acid is now HISD) Silent mutation on second codon, third amino acid changed from ILE to ASN. Please answer both A. And B. Thank you! Complete the following sentence. strategies include things like advertising, public relations, cold calling, direct mail, and internet marketing. Who was Karl Marx and what were the primary arguments made byKarl Marx? Why did Marxism become such a powerful ideological forceacross Europe during the late nineteenth and early twentiethcenturies Se presentaron entre 50 y 80 participantes del Nivel 1. Para trabajar durante el certamen se pudieron agrupar en forma exacta si lo hacan de a cuatro; pero si lo hacan de a cinco, faltaba una persona. Cuntos participantes del Nivel 1 se postularon? In 2013, Jack and Shirley Wright moved from Riverside, in Southern California, up to Santa Clara, in Northern California, when Jack's company opened a new branch office there. They decided to rent for a while so they could get to know the area before buying a home. Three weeks ago, they finally found and put a contract on a lovely 3-bedroom ranch, and the sellers accepted the first offer. They took that as a good sign, but now it's only 5 days until the close of escrow and they still haven't signed the escrow papers yet. In fact, they aren't due to sign the escrow papers until the day before the actual close of escrow. The Wrights are under the impression that something is wrong, because when they sold their last home, the escrow instructions had to be signed by both parties to the transaction immediately after they all signed the purchase agreement--about 60 days ahead of the actual close of escrow date. Which of the following is true of this situation?a. Their current agent has violated his fiduciary duties to them because he is mishandling their finances, and putting off handling the escrow until the last minute, thereby risking their new home and monies.b. Their agent in Riverside was simply being cautious by handling the escrow so early in the game, because in California, escrow signing generally takes place in the last 2 weeks prior to the actual close of escrow.c. The escrow practices in Southern California differ from those in Northern California. In Southern California, the escrow instructions are signed by the buyer and seller shortly after theyve signed the purchase agreement, just after the start of escrow, which is about 60 days prior to the actual close of escrow. In Northern California, the escrow instructions are usually not signed until one or two days just before the close of escrow.d. As of December 2014, the escrow practices have been changed from what they were in 2013 (when the Wrights sold their previous home), to stipulate that the escrow signing date and location are to be determined by both the buyer and the seller, as well as to the broker who is in charge of handling the escrow proceedings. Therefore, there is no specific regulation that sets forth the date or time for such proceedings. However, their agent was negligent in not explaining this to them, as well as not asking for their input into the signing date. 6 13 multiply by 2 and then add 1 The dwarf planet Pluto has an elliptical orbit with a semi-major axis of 5.911012 m and eccentricity 0.249. Calculate Pluto's orbital period. Express your answer in seconds. Calculate Pluto's orbital period. Express your answer in earth years. During Pluto's orbit around the sun, what are its closest distance from the sun? During Pluto's orbit around the sun, what are its farest distance from the sun? I'm pretty sure they meant "farthest" Lily is 5 inches shorter than Dan. If Dan is 67 inches tall, how tall is Lily?Write an equation to model the problem using h for Lilys height. If you claim that people, especially the disadvantaged, look to the government to meet their needs, you are speaking as a Write an algebraic expression for each of the following. The sum of 25 and h divided by 5 1. what are the implications or consequences of understanding truth and morality as absolute and objective rather than relative and subjective? list several examples. how do the concepts of general and special revelation i What strategy is effective at reducing illness? Question 13 options:eating chicken soupcovering mouth when sneezingwearing a hat and coat outsidekeeping windows open