1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
12

"what windows process is responsible for authenticating users?"

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
8 0
Lsass.exe /................................................
You might be interested in
Helppppp mee eeeee eee
almond37 [142]

Answer:

a

Explanation: bc it is

8 0
3 years ago
Read 2 more answers
Hiding data within pictures, audio, or video files can be difficult to detect and find. What can be done to reduce this?
DIA [1.3K]

Answer:

The hiding of the information/data in the images ,videos and audio is referred as stenography This can reduced by taking several steps like:-

  • Extraction method is the widely used method for the separation and picking out the data and the image or other data forms from each other.
  • Hue and saturation method works on the images and audios that  can find the hidden data.
  • Image processing is doen on the image which enhances the form of it by extraction of the unnecessary data from it.

5 0
3 years ago
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is k
aniked [119]

Answer:

hot site

Explanation:

8 0
2 years ago
Who do we make games for?(single term)
Ket [755]

Answer:

Gamers

Explanation:

5 0
3 years ago
Read 2 more answers
What protocol allows us to use a domain name like .com instead of an ip address?
san4es73 [151]
The answer is DNS (Domain Name System)

IP addresses are difficult to remember and therefore, the internet allows you to specify a computer using a host name. The same case happens to DNS. It maps domain names to IP addresses. Domain names are alphabetic making them easier to remember.



4 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • Which of the following will affect the size of your monthly mortgage payment? A The size of your down payment B The length of yo
    5·1 answer
  • What are some of the good effects of social media
    7·1 answer
  • Please help me out with my essay
    15·1 answer
  • Assume:
    14·1 answer
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • ___________allows you to see what the final web page will look like.​
    10·1 answer
  • What is the correct sequence in which a computer operates​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!