__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Answers

Answer 1

Answer:

Message authentication

Explanation:


Related Questions

Which of the following can be termed “application software”? *
1 point
a) DOS
b) Linux
c) Defragment
d) Internet Explorer/ Microsoft Edge

Answers

The answer option which can be described as an application software is: d) Internet Explorer/ Microsoft Edge.

A software can be defined as a set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

In Computer and Technology, software applications (programs) are broadly classified into three (3) main categories and these are;

System softwareUtility softwareApplication software

An application software refers to a type of software applications (programs) that is typically designed and developed for the performance of a specific task rather than the operation of a computer system.  Some examples of application software include the following:

1. Internet Explorer/Microsoft Edge

2. Notepad

3. Windows media player

Find more information: https://brainly.com/question/14379808

A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.

Answers

Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.

In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information.

With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.

Learn more : https://brainly.com/question/25682762

pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(

Answers

I wanna help so bad but I failed cs

We _____ information about space. For example, while reading a textbook, we encode the place on a page where certain material appears.

Answers

Answer:

Extremes is the answer for the blank.

Explanation:

Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.

Answers

A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.

A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, the different types of server include:

Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb server

A typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.

Read more: https://brainly.com/question/21078428

Which browser feature will delete your history, cache, and cookies the moment you close the special window

Answers

Answer:

Private Browsing

Explanation:

Stuff like DuckDuckGo or Brave

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

PLEASE HELP! WILL MARK AS BRAINLIEST
JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Answers

A form is an access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.

Answers

get the picture glue it on the screen

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

why are extensions necessary in scratch programming as a whole?​

Answers

Scratch extensions are vital for scratch to interface with the external hardware and information.

Scratch simply means a free programming language where an individual can create their own interactive stories.

It's simply the world's largest coding community for children. Scratch extensions are vital for scratch to interface with the external hardware and information.

Read related link on:

https://brainly.com/question/15418798

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

The frame rate is the result of multiplying the length of the film times its width

True or False

Answers

Answer:

False

Explanation:

frame rate is how many frames are shown per second in a video

the length of the film times the width is the resolution. not frame rate

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

In one to two sentences, describe how you would create a border around a group of cells.

Answers

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies?

Answers

There are technology that are used to detect and identify objects with tracking tag. The statement is an example Smart logistics IOT technologies.

Smart logistics is commonly called Connected logistics.  It helps or allows us to have near real-time tracking of movement/delivery of goods and services.

It is often used by ECommerce companies, food delivery companies, app-based taxi service companies, online markets etc.

 

In the logistics process, Internet of things can aid an individual by tracking goods and services as it saves time.

Learn more from

https://brainly.com/question/19995128

How can she change that value so it is reflected in the chart in her presentation?

Answers

Answer:

She can change the value in the mini- spreadsheet for the chart in PowerPoint.

Explanation:

Answer:

What she said above or below me

Explanation:

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Answers

Answer:

Hey there!

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Hope this helped! :)

How to fix common problem of a computer system?​

Answers

Some ways you could fix a common problem in a computer system are

Run a thorough virus scan.
Update your software.
Cut down on the bloat.
Test your Wi-Fi connection.
Reinstall the operating system.

Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros​

Answers

The feature of spreadsheets that will help Rohan decide where to invest his money is;

Option A; Solver

Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".

The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results.

The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.

Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.

Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.

Read more at; https://brainly.com/question/15032995

According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?

Answers

Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.

Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.

Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.

Read related link on:

https://brainly.com/question/25740331

___________________________________ allows many home users, corporations, and organizations around the world to connect far more computers to the Internet than they would otherwise be able to connect.

Answers

Answer:

network address translation

Explanation:

Question about microscope ​

Answers

Answer:

1.  c. diaphragm

2.  a. ocular lens

3.  b. fine adjustment knob

4.  c. course adjustment knob

5.  d. nosepiece

6.  a. simple light microscope

7.  d. A, B, and C

8.  a. light switch

Explanation:

Hope this helps.

People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.

Answers

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businesses

See more here: https://brainly.com/question/14728967

Other Questions
A. WealthB. Level of livingC. liquidityD. Assets Can you predict what changes will come to data storage in the next decade? Which statement is true,please anwser i put more pointsA, Individual genes are made of chromosomesB, Most genes are made up of more than one DNA moleculeC, Some inherited traits influence more than one geneD, Inherited traits develop because of the instructions in the gene which of the following shows a way to factor the expression -6x+18 Kaelyn's mother, Judy, looks after Kaelyn's four-year-old twins so Kaelyn can go to work (she drops off and picks up the twins from Judy's home every day). Since Judy is a relative, Kaelyn made sure, for tax purposes, to pay her mother the going rate for child care ($16,300 for the year). What is the amount of Kaelyn's child and dependent care credit in 2021 if her AGI for the year was $130,000? cm 5. Express the result of adding 856.6g and 23.86g to the correct number of significant figures. Robert climbed 775 step in 12 1/2 minutes.How many steps did he average per minute? Which equation could best be used to determine the valueof f(3) for the function f(x) = 2x + 4?1) f(3) = 23+ 42) f(3) = 2(3)+43) f(3) = 3(2x) + 44) f(3) = 3(2x + 4) Help Im giving brainlyest Can someone help me The three main bodies of law that that grew out of the ______ were the Law of Citizens, the Law of Nations and the Law of Nature. What is the Ratio of 129 215 examine the following sequence 1,4,9,16,25why is 36 the next number in the sequence ? because the pattern is How does the repetition in each stanza shape the meaning of Part I of "The Highwayman"?A The repetition of the words galleon, breeches, cobbles, and cascade emphasizes the dreary setting.B The repetition of the words riding, twinkle, daughter, or moonlight reinforces the highwayman's priorities.C The repetition of the words trees, wrinkle, window, and perfume shows what is important to Bess.D The repetition of the words inn-door, cocked-hat, to-night, and love-knot shows what is important to the landlord.Answer first and get 69 points When scientists refer to the DNA to RNA to proteins pathway, the RNA part really represents three differenttypes of RNA: messenger RNA (mRNA), transfer RNA (tRNA), and ribosome RNA (rRNA). How is each type of RNA important to protein production? ( Will Mark Brainliest and please only answer if your company 100% sure. And Do Not Repost Someone Else's Answer that is on Brainly Or Any Other Websites Please. Select all of the following that are quadratic equations. 7x2 + 14x = 0 x3 - 3x2 + 1 = 0 5x - 7 = 0 x2 + 3x -5 = 0 x - 5 = 9x + 7 x2 - x = 3x + 7 how many feet in 13 miles, 176 yards? A gene that is not expressed when paired with a dominant allele is called alantraitmutationbase pairrecessive allele The name of a literary work entitled Gullivers Baubbles is an example of which literary style? Please help. Can you reorder them correctly? Thank u