1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
7

What is the name of the process that is used to establish whether or not a user’s identity is legitimate?

Computers and Technology
1 answer:
pogonyaev3 years ago
8 0

Answer:

Authentication

Explanation:

The authentication process is used to check the identification of the particular user or computer system .we can give authentication to any user by the username and password. If a particular user puts the correct username and password into the website then it has the authority to access that particular website.

For example: In the any mail website, if a particular user login with the correct username and password then it has an authenticated user. It means it has the right to access the mail of that account .  

You might be interested in
What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
Phoenix [80]

Answer:The kernel provisions hardware resources to meet software requirements.

Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.

Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.

Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.

3 0
3 years ago
Which of the following statements is/are true by definition.
Rudik [331]

Answer:2. electrical equipment shall be considered readily accessible to those to whom ready access is requisite when it is capable of being reached quickly for operation by using a portable ladder.

Explanation:

3 0
3 years ago
Complete the sentence. <br><br> ____ Is the study and use of very small technology units
kondor19780726 [428]

Answer:

nanotechnology

Explanation:

I just took the test

3 0
4 years ago
Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vaca
Otrada [13]

Answer:

This question is imcomplete, here is the complete question

Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vacation is priced at $750. He has only $1,537 in his checking account, so he cannot afford to purchase both. After much thought, Edison buys the computer and writes a check for $1,299. Identify what role money plays in each of the following parts of the story. Hint: Select each role only once. Role of Money Medium of Exchange Unit of Account Store of Value Edison can easily determine that the price of the computer is more than the price of the vacation. Edison has $1,537 in his checking account. Edison writes a check for $1,299.

Identify what role money plays in each of the following parts of the story.

Explanation:

Brian can effortlessly determine and conclude that the cost of the computer is more than that of the price of the vacation.= Unit of Account

Brian has a total amount of $1,537 in his checking account.= Store of value

Brian then writes a check for $1,299.= Medium of Exchange

5 0
3 years ago
Which of the following are examples of packages you can import and use classes from in java?
Svetlanka [38]
It’s D java. int i think
8 0
3 years ago
Other questions:
  • What will happen if you change data that is used in a formula
    10·1 answer
  • Write the sql command to show which tutor needs to be reminded to turn in reports.
    13·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
    13·1 answer
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • Photoshop files are generally small in size. True or false
    13·1 answer
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • for a given array of integers perform operations on the array return the resulting array after all operations have been applied
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!