1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
4 years ago
15

Fill in blanks The character which is not found on a standard keyboard is called _______ Charater.​

Computers and Technology
1 answer:
deff fn [24]4 years ago
7 0

Answer:

The character which is not found on a standard keyboard is called __symbol_____ Charater

Explanation:

You might be interested in
"if" statements are part of creating computer programs, what are these instructions called and how would you use them?
podryga [215]

Answer:

if means that like (if this happen it will come or not come answer)

Explanation:

sorry I don't know how to tell but plz reply if you understand or not.

7 0
3 years ago
Read 2 more answers
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
A(n) ________ software installation enables you to decide which features you want to install on the hard drive
Mazyrski [523]
<span>An element in the Excel window that displays the value or formula contained ... which you can specify the type of calculation you want to perform in an Excel formula are: ..... installs all the most commonly used files to your computer's hard drive. Full. A(n) ______ software installation enables you to decide which features you ...</span><span>
</span>
5 0
4 years ago
Which of the following Web 2.0 tools can aid in searches using key words? (1 p
svet-max [94.6K]

Web 2.0 Tools can aid in searches using key words

Explanation:

Web 2.0 Tools can aid in searches using key words .The followings are some tool like face book and you tube and google search that allow users to searches using key words. web 2.0 tools can be used to teach curriculum content, store data, create and edit video, edit photos,etc.,

Web 2.0 tools are easy to use websites designed to encourage creativity, team work, also helps in higher order thinking skills in classroom .The important thing is to teach students to think critically with whatever tools they have in front of them using key words while searching.

3 0
3 years ago
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
Other questions:
  • Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
    12·1 answer
  • If a security officer is non-commissioned officer, he can carry a baton on duty if he went through a training class
    8·1 answer
  • What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
    11·1 answer
  • A ________ is a dummy function that is called instead of the actual function it represents, to test that the call to and return
    8·1 answer
  • Charlie wants you to include the following topics in your presntation: an overview of project management and its hrity,a descrip
    15·1 answer
  • How is a source file different from a "listing file"?
    5·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Which 2 conditions must be met in order to use receipt forwarding in QuickBooks Online?
    11·1 answer
  • What is the output?
    12·1 answer
  • Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicab
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!