1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
11

Of the listed principles, which process would transpire if a user provides a correct username and password?

Computers and Technology
1 answer:
kompoz [17]3 years ago
5 0

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

You might be interested in
Nolan has just created a linked cell to another cell in a separate worksheet in his current Excel 2016 workbook.
kipiarov [429]

Answer: dependent

Explanation:

A Cells containing formulas which refer to other cells are known as dependents.

These are cells that depend on values in the selected cell.

A dependents cell can either contain a formula or a constant value.

(Ctrl + ] ) Is used as a shortcut when selecting dependents cells in an active cell.

Another option is to make use of you (Tools > Formula Auditing > Trace Precedents).

4 0
3 years ago
Read 2 more answers
The user can close all the programs if he closes the open virtual desktop true false
steposvetlana [31]

The user cannot close all the programs if he closes the open virtual desktop.

<h3>What are virtual desktops?</h3>

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: brainly.com/question/14332029

#SPJ12

3 0
2 years ago
Information such as audio or video files are broken down into
liberstina [14]
...packets. I hope this helps.
5 0
3 years ago
The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pic
tester [92]

Answer:

The correct approach is "Presence awareness".

Explanation:

  • The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself.
  • With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.
5 0
3 years ago
Uppose a computer processor can perform about 3.8 billion operations per second. how many operations can it perform in 0.6 ​seco
Ratling [72]
We have information:
3.8 billion         1 second
x billion            0.6 second

To find out the number of operations we need to cross multiply these equations and solve for x.
3.8 * 0.6 = 1*x
x = 2.28 billion

In 0.6s computer can do 2.28 billion operations.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • Edhesive 3.4 question 2
    11·2 answers
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    12·1 answer
  • Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the PrintAll member function and a separate cout stat
    14·2 answers
  • An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
    6·1 answer
  • While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
    7·1 answer
  • What is the default view in a Word document?
    10·2 answers
  • Question #1
    5·2 answers
  • How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either
    7·1 answer
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!