1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
2 years ago
5

Authenticating information can be something a user knows, like a password; something a user has, like a smart card; or something

a user is, like a fingerprint. True False
Computers and Technology
1 answer:
xenn [34]2 years ago
8 0

Answer:. True

Explanation:

yes it is true in my opinion

You might be interested in
DHCP and FTP servers listen for and send network traffic on:
julsineya [31]

Answer: Well known ports

Explanation:

DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port.

FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information.

Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports.

 

5 0
3 years ago
The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The co
Nezavi [6.7K]

Answer:

Explanation:

B is correct

3 0
2 years ago
20 POINTS!!! I NEED HELPP
Cloud [144]

Answer:

Apple

Explanation:

5 0
3 years ago
Read 2 more answers
Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
____ [38]
Apple is better then Samsung
6 0
2 years ago
Read 2 more answers
What does a linear bus topology used to connect all network devices?
pentagon [3]
<span>A linear bus topology uses a common background cable to connect all network devices.</span>
5 0
3 years ago
Other questions:
  • Propose, two new, proudly South African ways, which you can visualize that the internet of things, can be used in at work to mak
    7·1 answer
  • What is the difference between chrome and chromium browser?
    9·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • How a computer encodes text, how it is processed and how computer data is represented.
    6·1 answer
  • When one user could perform a query to determine which recordings had a track length of four minutes or more, and another user c
    9·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • Secondary hard drive whats its purpose
    5·1 answer
  • Allows a user to control the<br>volume of the computer​
    8·1 answer
  • What department is cyber security
    6·2 answers
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!