1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
6

Computer science

Computers and Technology
1 answer:
Ksju [112]3 years ago
7 0
Pseudocode is a notation resembling a simplified programming language, used in program design


a text file is a computer file that only contains text and has no special formatting such as bold text, italic text, images, etc.
You might be interested in
Lista de 10 artefactos que usan corriente continua para su funcionamiento
lord [1]

Answer:

vvyub

Explanation:

hbhg

7 0
3 years ago
Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
Aleksandr-060686 [28]

Answer:

a. WS-Trust

Explanation:

WS-Trust can be defined as a WS-specification as well as OASIS standard that help to provides extensions to WS-Security, in order to facilitate a mechanism for issuing, renewing, as well as validating of security tokens which is why the aim and objectives of WS-Trust is to help and enable applications to construct trusted SOAP message exchanges.

Nevertheless WS-Trust enables the issuance as well as the dissemination of credentials within several and various trust domains.

5 0
3 years ago
8.2 code practice edhesive?
Illusion [34]

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

6 0
3 years ago
I want to work with LDAP. what is LDAP?
pychu [463]
It's an internet protocol (Lightweight Directory Access Protocol) used to fetch data from servers.
5 0
4 years ago
Read 2 more answers
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
Other questions:
  • How to ask for a letter of recommendation via email?
    10·1 answer
  • Short Answer: Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could
    8·1 answer
  • Among the list of ways workers can protect themselves when working on or near any construction zone, is to _________________.
    15·2 answers
  • 6. A password contains at least 8 distinct digits. It takes 12 seconds to try one combination, what is the minimum amount of tim
    5·1 answer
  • What data type can be used to hold any single character, including numbers and non-printing characters?
    15·2 answers
  • Plymouth Colony was originally founded by a group of people called Pilgrims. Since Plymouth did not have an official charter fro
    15·1 answer
  • You plan to use the Fill Down feature on a formula and you need to keep a cell reference the same. Which one of the following fo
    7·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • NEED HELP! BRAINLIEST FOR WHOEVER ANSWERS CORRECTLY FIRST!!!
    14·1 answer
  • One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to shar
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!