Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system.

Answers

Answer 1

Answer:

Authentication

Explanation:

Remote access connections must be secured using authentication and encryption software. Authentication software confirms the identity of the user or computer system.


Related Questions

The questions are from HTML. State whether the following statements are true or false. 1. HTML is the programming language. 2. Web page is the collection of website. 3. <marquee> tag is used to link the Hyper text. 4. Heading tag supports different levels from H1 to H6. 5. Attributes provide additional information to the HTML tags. 6. Empty tags must be closed with ending tag </>. ​

Answers

Answer:

true

Explanation:

hope this helps

The flowchart that show the sequence of logical operations executed by a computer is called a: A. Systems flowchart B. Operations flowchart C. Program flowchart D. Decision flowchart

Answers

Answer:

It is called a Program Flowchart.

Explanation:

What is output?
C = 1
sum 0
while (c < 10):
c = c + 3
sum
sum + C
print (sum)

Answers

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

This contains lists of commands that you can use to tell the computer what to do. o command prompt Finder folder Menu bar​

Answers

Answer:

Menu Bar

Explanation:

its right

If the 5th term of an A.P is 7 and the first term is 2.Find the common difference.​

Answers

Answer:

5/4

Explanation:

a=2

a5=7

a+(5-1)d=7

2+4d=7

4d=5

d=5/4

Which of the following is the best definition of the
word aptitude?
personal interest
potential skill level

success factor
actual skill level

Answers

Answer: For the definition of aptitude the answer is B-potential skill level . For the definition of ability the answer is D -actual skill level

Explanation: I did the assessment:)!

The best definition of the word aptitude will be actual skill level. Then the correct option is D.

What do you mean by the word aptitude?

A component of the ability to perform a certain sort of task at a specific level is aptitude. Exceptional aptitude may be deemed to possess the skill. The capacity to carry out particular tasks, whether physical or cerebral but rather whether developed or underdeveloped, is referred to as aptitude. When compared to talents and abilities, which are acquired via training, the ability is frequently contrasted.

Both capability and IQ are terms that refer to a person's mental capacity. Unlike the basic concept of intelligence (IQ), aptitude frequently refers to any of a variety of diverse traits that can exist independently of one another, such as the ability for programming language, military flying, or air traffic control.

The term "aptitude" is best defined as real skill level. Then the correct option is D.

More about the word aptitude link is given below.

https://brainly.com/question/20372641

#SPJ2

Technologies are having a negative impact on businesses.

Answers

Answer: False

Explanation: I think its false because technologie has had a good impact on businesses.

Answer:

False

Explanation:

Technology has increased the capacity of businesses.

Match the following
image editing software
Web browsers
Computer Aided Design, or the use of software to aid in
1,
technical drawings and models
2. Information processed or stored by the computer
3. software that organizes a collection of data
also known as graphics software, this software enables a
4.
person to change or create visual images on a computer
fields on a screen used to search for specific information in a
5.
database
CAD
query
Web page
dota
6. Software used to browse the World Wide Web
a page on the World Wide Web that may contain text,
7
Images, audio, or video
database

Answers

Answer:

4

Explanation:

because your wanting something that's well edit an image

JavaScript is very complex scripting ________________​

Answers

Answer:

yes it is was this a questipn

Answer:

Java script is very complex scripting language.

Explanation:

Java script is most commonly used in a client side scripting language, user request an html page with java script is sent to the browser.

Java script code is written into an the html page, java script can be used to the in other contexts  a web browser.Java script could not be used to write real complex programs, and site is used to the deals of java script in web browser.Java script is the primarily a scripting language for they use of html pages,java script is client side scripting language.Java script was the developed by the Brendan, and it can be used in a server side environment.Java script they descend to the both C and C++ languages gone in quite different directions.Java script is a lightweight interpreted programming language and java script source code compiled into a faster to the binary format.Java script is to contain the applied to your html page in a similar manner to CSS.Java script is the object oriented nature to understand to go further knowledge of that language and write more efficient code.Java script is developed by the Netscape, java script to run the designed Netscape navigator.

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

It is implied in the AMS Climate Paradigm that components of Earth’s climate system (e.g., atmosphere, hydrosphere, cryosphere, geosphere, and biosphere) interact in a(n) ________ way as described by natural laws.

Answers

Answer:

orderly

Explanation:

The American Meteorological Society presents information, development, and an interdisciplinary approach towards the researches of atmosphere and hydrosphere. The goal of the society is intended towards developing a research-based idea covering the topics of atmosphere and science. The atmosphere, hydrosphere, cryosphere, geosphere, and biosphere are the components of the environment that helps in determining and analyzing the climatic condition of the Earth.

Programming environment is

Answers

Answer:

environments containing language specific editors and source level debugging facilities or all of the hardware and software in the environment used by the programmer.

Explanation:

quick google search.

On a webpage, a _____ provides supplemental material such as social networking feeds and ads. Group of answer choices footer sidebar header navigation bar

Answers

Answer:

sidebar

Explanation:

The part of the webpage that is being described in this question is known as a sidebar. These are the far left/right sides of the webpage and are usually used for networking feeds, ads, related information, major points of the main page, biographical info, as well as persuasive information. This section of the webpage serves two main purposes to provide the viewer with advertisements and to encourage the reader to read the more detailed main article.

Different types of names given to explicit convertion in java

Answers

Answer:

Different types of name given to explicit conversation in java are

1. Automatic

2. Explicit

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Answers

Answer:

extranet

Explanation:

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

A technician is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. The line connected to the expansion card is MOST likely which of the following cable types?A. CoaxialB. CAT3C. CAT6D. Multi-mode fiberE. Single-mode fiber

Answers

Answer:

C. CAT6

Explanation:

CAT6 cable is the standard twisted pair cable for Ethernet and other network physical layers, lagging behind with category 5 / 5e The cat 6 cable can be detected by printing on the side of the cable sheath. TIA / EIA-568 defines cable type, connector type and cabling topology. Cat 6 cable has a maximum length of 55 m (180 ft) when used for 10GBASE-T and is rated at 500 MHz At a frequency frequency of 500 MHz, the ISO / IEC CAT 6A connector performs 3 dB better than the Cat 6A connector, which is EIA / TIA specified.

What does it mean to say RAM is volatile? *

Answers

It means that it’s computer memory that needs power to keep the stored information. You can easily lose your data when the power is interrupted.

adding transition slides to a presentation

Answers

Answer:

1. Select the slide you want to add a transition to.

2. Select the Transitions tab and choose a transition. Select a transition to see a preview.

3. Select Preview to see what the transition looks like.

To remove a transition, select Transitions > None.

By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. A) identity thieves B) keyloggers C) hackers D) cyberstalkers

Answers

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

When did the silent movie era end?
A.1919
B.1929
C.1939
D.1949

Answers

Answer:

The answer is 1929.

Pretty sure your answer is B. 1929

Using the drop-down menus, correctly match the name of the person with the computer-programming
innovation
In 1975,
founded Microsoft, which released Altair BASIC, the first
programming language for personal computers.
found the first computer bug in 1947, and invented the concept of a compiler in
1952
v led a team at IBM that developed FORTRAN and its compiler in 1957
developed C++ programming language, and published the reference guide
in 1987
released the Python programming language.

Answers

Answer:

1. Bill Gates and Paul Allen

2. Grace Murray Hopper

3. John Backus

4. Bjarne Stroustrup

5. Guido van Rossum

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *
10 points
Application software
System software
Open-source software
Proprietary software

Answers

Answer:

Open Source software.

Answer:

open source software

Explanation:

Which of the following is not a method for opening Word software? right clicking on the desktop and selecting "view" selecting the Start button and navigating through all programs selecting the Start button and navigating to the most recently used programs using an icon on the desktop

Answers

Answer:

right clicking on the desktop and selecting "view"

Explanation:

A word software enables us to create, edit  two or more documents at the same time and print documents, to write text, store it electronically, display it on a screen and modify it by entering commands, and then print it.

It enables you to draw graphs, and possibly even convert videos into a document.

Word software cannot be opened by right-clicking on the desktop and selecting "view".

Answer:

right clicking on the desktop and selecting "view" selecting the Start button

Explanation:

Word pad is a word processing software included with all versions of MS- Windows starting from Windows 95 to Windows 10. It is more better compared to Notepad and much simpler than Microsoft Word. Microsoft replaced the Microsoft write.

You cannot access word pad by clicking on the desktop and selecting "view", the simplest way to access Word pad is by clicking on the start button and then clicking on the word pad.

Can anyone help me
I will make you a brainalist

Answers

Answer:

Explanation:

Exercise A:

1. A table.

2. Categorical.

3. Access.

4.Queries.

5.ACCDB extension.

Exercise B:

1. Insert Tab.

2. DoCmd.Quit method.

3.Navigation Pane.

4. Modify table data.

5.The top pane and the bottom pane.

Hope this helped you!

Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his computer and help it function properly?

Answers

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

Answer:

Utility software

Explanation:

Two fingers are assigned to six letters each. What fingers are they?

Answers

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

evolution of new technology also increased the crime in our society explain​

Answers

Answer:

yes ,for sure evolution of new technologies also increased the crime in our society. Many cyber crime are occurring due to the use of new technologies. People can hack the data , transfer money from others account and so on . People are using new technology to harm others ,steal others data and information . It has given an opportunity to many people to do various crime easily .

In one to two sentences, explain how consumption is determined in a market economic system.

Answers

Answer:

In a free market economic system, consumption is determined based on the goods and services that make use of the most efficient use of resources and production factors such that consumers encourage producers to produce what they want as such consumer spending is equal to the sum of spending for essential commodities and the extra spending based on disposable income which reflects the wants, or trend of the consumers and therefore, the future pattern of production

Explanation:

Answer:

In a free market economic system, consumption is determined based on the goods and services that make use of the most efficient use of resources and production factors such that consumers encourage producers to produce what they want as such consumer spending is equal to the sum of spending for essential commodities and the extra spending based on disposable income which reflects the wants, or trend of the consumers and therefore, the future pattern of production

Explanation:

Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.
makeOutWord("<<>>", "Yay") → "<>"
makeOutWord("<<>>", "WooHoo") → "<>"
makeOutWord("[[]]", "word") → "[[word]]"

Answers

Answer:

The following are the answer to this question.

Explanation:

In the given code, a "makeOutWord and word" is already used to hold some value. In this code, we define a string method "makeOutWord" that accepts two string variables "out and the word" in its parameter.

Inside the method, a return keyword is used that uses the string variable "out and the word" with the "substring" method, this method is used to returns a new string from an old string value, and it also uses the "word" string variable for the return value.  

please find the attached file for code:

If something is copyrighted,
how can it be used?
A. Only with credit
B. Only with permission
C. With credit or in certain "fair use" cases
D. With permission or in certain
air use" cases

Answers

D
Because you need permission
Other Questions
what is nationality ? why is it important If the number 3 were added to the set {1,1,3,3,4,4,5}, which central tendency would change? A)Mean B)Mode C)Range D)Median Write a two paragraph paper on your last day of school in March (Spring break of 2019/2020 school year) VS your first day of the new school year 2020/20021. Think about these questions before you began your writing. 1. Why did schools shut down and resume with Zoom classes? 2. How is it different from the start of this years school? What is the 2021 NHD Theme? Group of answer choices Conflict and Compromise in History Taking a Stand in Histoary Triumph and Tragedy in History Breaking Barriers in History Communication in History: The Key to Understanding After examining a child at his 2-year checkup, the boy's pediatrician said that the z-score for his height relative to other 2-year-olds in the country was 1.59. The pediatrician explains to the parents that the most extreme 5% of cases often require special treatment or attention. a) Does this child fall into that group? b) What do you need to assume about the heights of 2-year-olds to find your answer to part a? a) The child _______into this group because he is___________than_______ standard deviation from the mean.b) Choose al that apply. A. the distribution of heights is skewed B. the heights are independent C. the distribution of heights is symmetric D. the number of heights is very large E. the distribution of heights is unimodal This question has two parts. Use the information to answer Part A and Part B. Information 1 A camp leader buys a book for each of her campers. She spends $7.50 on each book. Question 1 ,begin emphasis, Part A,end emphasis, Which expression can be used to find the amount of money the camp leader spends on b books? Question 1 Answer options with 4 options (A.)7.50 times b (B.) 7.50 plus b (C.)7.50 minus b (D.)7.50 divided by b Question 2 ,begin emphasis,Part B,end emphasis, If the camp leader has 12 campers, how much does she spend on the books? Enter the answer in the box. Question 2 Response area with 1 text input box $ 50 POINTS! Is Brainly lagging for anyone? It's kicking me off the site. A lot. It says something like 502 bad gateway. Also, I'm just putting this under math, and hopefully, people see it. The Blakely family has driven 50 miles of a 200-mile trip. Their car travels 30 miles per gallon of gas. How many gallons of gasoline, g, will the car use on the remainder of the trip? 2 and one-half gallons gallons gallons 8 and one-third gallons What do you understand by the term 'life process"? Which agreement led to the reduced release of chemicals that harm the ozone layer? HELP ME PLEASE, what kind of cell is? A student half a jar with rice and tightens the jars lid. The student wants to use the jar of rice to model particle motion of a substance in any state of matter. A. Describe how the student can use the jar of rice to model particle motion of a substance in each state of matter: solid, liquid, gas. Find the mean absolute deviation of the set of data. 2, 3, 5, 7, 9 What is the product of 3yproduct of (3y^)(274) . Explain how surface waves can have characteristics of both longitudinal waves and transverse waves. Please use 3 content related sentences. (ref: p.388-393) The cooking time for a mini-loaf of bread is 5 minutes longer than half the time it takes to bake a regular-sized loaf of bread. If it takes 25 minutes to bake a mini-loaf, how long does it take to bake a regular-sized loaf?10 minutes20 minutes30 minutes40 minutes 10x 2-60| 0 ||0Is it correct? Order of operations A set of three scores consists of the values 6, 3, and 2. 1. 2X 2 =______.a. 35.b. 33.c. 22.d. 6.2. (2X) =______.a. 248.b. 124.c. 61.d. 39. fill in the blank i need a ___ bleep _____ ___ lil shawty the baddest Two numbers are in the ratio 9:7 if one number is 324, what is the other number?