1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
2 years ago
13

If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.

Computers and Technology
1 answer:
podryga [215]2 years ago
8 0

If there is a secure socket layer in place, a password is one that you need in addition to a user id in order to access the shared files.

<h3>What is a password?</h3>

A Password is known to be a kind of a word, a phrase, or  combination of characters that is made to differentiate an authorized user or process from any kind of unauthorized user,

Hence, If there is a secure socket layer in place, a password is one that you need in addition to a user id in order to access the shared files.

Learn more about secure socket  from

brainly.com/question/13041590

#SPJ1

You might be interested in
When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
fomenos
For SMB:  \\server\path\to\share
For CIFS: //server/path/to/share
3 0
4 years ago
What is the result of a network technician issuing the command ip dhcp excluded-address 10. 0. 15. 1 10. 0. 15. 15 on a cisco ro
Hunter-Best [27]
The answer to this question is 83774838473773
3 0
2 years ago
A programmer has an idea to use just one language for the content, structure, and style of web pages. What might be a problem wi
Juliette [100K]
Doesn’t give the programmer a lot of freedom to be creative. Using only one language on the web limits the amount features the programmer could create.

For example, just only using HTML limits the web page’s features to use scripts like Javascripts.
8 0
3 years ago
What was one of the first ways that health information technology (health IT) changed the way healthcare workers practice? A. Us
Elenna [48]

Answer: ....

Use of electronic health records (EHRs)

Explanation:

An Electronic Health Record (EHR) is an electronic version of a patients medical history, that is maintained by the provider over time, and may include all of the key administrative clinical data relevant to that persons care under a particular provider, including demographics, progress notes, problems, medications.

An electronic health record (EHR) is a digital version of a patient's paper chart. EHRs are real-time, patient-centered records that make information available instantly and securely to authorized users. An electronic health record is the systematized collection of patient and population electronically-stored health information in a digital format. These records can be shared across different health care settings.

6 0
3 years ago
Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrive
Damm [24]

I guess the answer in the blank is processes.

Activities called processes involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.

6 0
3 years ago
Other questions:
  • Mobile ethnography can be especially useful for documenting public behavior, such as waking up in the morning or administrating
    9·1 answer
  • Write the DML statement to query the database for the following: Output the fname, lname, total_amount_owed of the student with
    5·1 answer
  • Which tag will you use if you want your web page to look the same as your source code?
    11·1 answer
  • Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0
    6·1 answer
  • Describe a hybird electrical vehical
    12·1 answer
  • As with most professions, photography comes with its own unique set of terms and jargon. Identify at least four different words
    5·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • What’s your tiktok? if u have one
    10·2 answers
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
  • The second purpose of government regulation is to​ _____________________.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!