1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
7

what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email

Computers and Technology
2 answers:
ratelena [41]3 years ago
4 0
You need a ram mobile because it’s too sensitive
nikklg [1K]3 years ago
3 0
Dod required a car to access data gahagsgssgsg
You might be interested in
How can the Internet help our country to be a leader in technology?
BigorU [14]

Answer:

it can help in the aspect of making technologies to be fastly operated with fast internet connection there by it top among all other countries

4 0
2 years ago
NARIO 1
Alika [10]

Answer:

85%

Explanation:

8:00 a.m - 1:00 pm = 5 hours

Sunday - Wednesday = 4 days

Total scheduled hours = 5 * 4 = 20 hours

Hours in adherence :

Sunday to Tuesday (3 * 5 hours) = 15 hours

Wednesday : (11:00 a.m - 1:00 a.m) = 2 hours

Total hours adhered = (15 + 2) = 17 hours

Commitment adherence percentage :

(Total hours adhered / total scheduled hours) * 100%

(17 / 20) * 100%

0.85 * 100

= 85%

5 0
2 years ago
Who want to go on scratch<br> I really need people to favorite and like my projects
mariarad [96]

Answer:

Sure

Explanation:

6 0
3 years ago
Read 2 more answers
هل تعتبر الشاشة من الوحدات الإدخال والاخراج​
dmitriy555 [2]

Answer:

لا

Explanation:

تعد من وحدات الاخراج فقط

4 0
3 years ago
Read 2 more answers
When using ________ access, access to the data starts at the beginning of the file and proceeds through all the records to the e
topjm [15]

When using sequential access, access to the data starts at the beginning of the file and proceeds through all the records to the end of the file.

3 0
2 years ago
Other questions:
  • Which button is used to open the Start menu in Windows Vista?
    14·1 answer
  • Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word
    15·1 answer
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • When does information become a liability for an organization
    6·1 answer
  • Businesses use spreadsheets to keep track of financial________.
    14·1 answer
  • Why is the Vietnam War referred to as The Living Room War
    15·1 answer
  • Which of the following is true of horror films like Insidious and The Conjuring?
    15·2 answers
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • Which of the following is the most reliable way to check the accuracy of a website?
    13·1 answer
  • Has replaced the need for landline telephones in many instance​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!