1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
7

what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email

Computers and Technology
2 answers:
ratelena [41]3 years ago
4 0
You need a ram mobile because it’s too sensitive
nikklg [1K]3 years ago
3 0
Dod required a car to access data gahagsgssgsg
You might be interested in
What computer worm was used to sabatoge iran's nuclear program?
Stels [109]
Researches at symantec have uncovered a version of the stuxnet computer virus that was used to attack irans nuclear program in November.
4 0
3 years ago
The words, the computer is the future, has how many bits?
Nadusha1986 [10]

The words, the computer is the future, has 64 bits.Modern computer has

two types of processors which include:

  • 32 bit
  • 64 bit
<h3>Bits</h3>

This is referred to as the smallest unit of data which is used in a computer.

The 32 bit computer are the old types which have a smaller processor and is

relatively slow.

The 64 bit computer on the other hand are the modern types with large

processors and are relatively fast.

Read more about Computer here brainly.com/question/13380788

4 0
2 years ago
The add or remove columns button in the paragraph group on the ____ tab allows you to create multiple columns in a text box.
Allisa [31]
<span>By accessing the formatting tab on the program, individuals are able to create and distinguish columns within various text boxes that are created. This allows for the page to be adjusted as to the developers liking, and better portray the information.</span>
7 0
3 years ago
Translating an algorithm into the syntax of Java is the design phase of software development.
Digiron [165]

Answer:

I think it's false

Explanation:

I don't think so. What makes me hesitate is that you may have been told that in your text or in the classroom.

Here are the steps as I understand them.

  1. Understand the problem you are trying to solve.
  2. Design a solution.
  3. Draw a flow chart.
  4. Write pseudo-code.
  5. Write code.
  6. Test and debug.

I think you've done the designing long before you start writing code or even pseudo-code.

4 0
3 years ago
HELP PLEASE GIVING BRAINLIEST
Phoenix [80]

Answer:

CompTIA A+ there ya go!!!

5 0
3 years ago
Read 2 more answers
Other questions:
  • #A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
    5·1 answer
  • The term drive app is used to describe applications stored on a computer true or false
    11·2 answers
  • Which is not an example of a lighter-than-air gas?
    5·2 answers
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • Placeholders can hold text but not graphics such as photos or charts. True or false?
    7·1 answer
  • Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 int main() 4 { 5 int number
    12·1 answer
  • Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs
    12·1 answer
  • a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
    9·1 answer
  • ¿Por qué disminuyó el tamaño de la población de caribús? Usa la evidencia inicial para explicar por qué disminuyó el tamaño de l
    5·1 answer
  • ASAP 50 POINTS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!