1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
12

"what windows process is responsible for authenticating users?"

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
8 0
Lsass.exe /................................................
You might be interested in
The benefits associated with software reuse are lower cost, better quality,
Sholpan [36]

Answer:

Software reuse is the technique through which updating the software system through the already defined components or assets of the software.This helps in increasing the productivity ,cost decrement , quality improvement etc.

But in actual case, the software reuse still persist high cost due to modification of inflexible designing of software .It also costs more than expected for the maintenance and training of software.

The security of the software is always at risk because of the usual and advanced hacking and attacking by the hackers even when the protect of software is high.Thus, these statements verify that the benefits of cost and security of software is not actually realized.

6 0
3 years ago
If background option when creating file. the color of the background is
DaniilM [7]

Answer:

Light Grey.

Explanation:

I guess because mostly I have seen document background colour is Grey.

7 0
3 years ago
Read 2 more answers
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
Released in 1976, the Apple I was Apple Computer's first product.<br><br> O True<br> O False
Anna35 [415]
False,
The apple was not a computer
6 0
3 years ago
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
padilas [110]

One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server

<h3>What is a Peer to Peer (P2P) Network?</h3>

In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.

In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

Complete Question:

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

1) Additional costs

2) none of these choices

3) Decentralized data access

4) Less secure

5) Difficult to expand

6 0
2 years ago
Other questions:
  • Determine the value of base x of (211)x=(152)8
    8·2 answers
  • A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
    10·1 answer
  • Most internet connections use what transmission
    13·2 answers
  • Earthquakes happen in the Earth’s
    10·1 answer
  • Which of the following is a step in paraphrasing?
    14·2 answers
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    7·2 answers
  • Which statement does NOT describe working with text in presentation programs?
    13·2 answers
  • A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
    9·1 answer
  • What laws are broken when you hack someone?
    9·1 answer
  • What is humanity’s greatest invention?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!