1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
7

what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email

Computers and Technology
2 answers:
ratelena [41]3 years ago
4 0
You need a ram mobile because it’s too sensitive
nikklg [1K]3 years ago
3 0
Dod required a car to access data gahagsgssgsg
You might be interested in
What is a feature of Print Preview? Fit to Document Fit to Margin Fit to Page Fit to Size
Rudiy27
Fit to page! Is a feature that
7 0
3 years ago
Read 2 more answers
Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?
Alex73 [517]
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
3 0
3 years ago
Read 2 more answers
What is the difference between hardware and software?
alina1380 [7]
A Hardware is any physical device used in. You can touch hardware, but you cannot touch software. Hardware is physical, and software is virtual. (brainliest) ??
4 0
3 years ago
Write down the numbering system from base 2 to 200​
natka813 [3]

Answer:

So, 11001000 is the binary equivalent of decimal number 200 (Answer).

 

3 0
3 years ago
Select the statements that identify benefits of programming design. Choose all that apply. It ensures that programmers working o
scoundrel [369]

Answer:

The answer is "Option i, iii, and iv"

Explanation:

The software design is a sequence of code, which is used to aggregate, calculating the efficiency of a common issue in software development within the same specific scenario.

  • It's also not a finished specification, that can be immediately translated into the origin of machine language code.
  • These testing aims to detect a list of steps on a machine, which is often used to solve a certain problem and optimize the performance of a task which is just as complicated as a corporate structure.
6 0
3 years ago
Other questions:
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • How can I sent a message?
    13·1 answer
  • Where is line-of-sight Internet common?<br> In space<br> Outdoors<br> Inside<br> In businesses
    10·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Explain the characteristics of a first generation computer​
    8·1 answer
  • Which of the following statements is correct? User data cannot be combined and shared among authorized users. In a nondatabase,
    6·1 answer
  • GIF is example of raster image<br><br><br> RIGHT OR WRONG?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!