1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

What is authentication?

Computers and Technology
1 answer:
Savatey [412]3 years ago
8 0

Answer:

C

Explanation:

I believe that's the answer if it's not sorry

You might be interested in
Which best describes color blindness?
lys-0071 [83]

What are the options?

If there are none...

MONOCHROMATIC would be your answer.

5 0
4 years ago
Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
kompoz [17]

A string parameter and returns new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. The implementation should uses a histogram from the histogram function

Explanation:

The below code is written in python :

alphabet = "abcdefghijklmnopqrstuvwxyz"

test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]

test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]

def histogram(s):

   d = dict()

   for c in s:

       if c not in d:

           d[c] = 1

       else:

           d[c] += 1

   return d

def has_duplicates(s):

   for v in histogram(s).values():

       if v > 1:

           return True

   return False

def test_dups_loop():

   for s in test_dups:

       print(s + ':', has_duplicates(s))

def missing_letters(s):

   r = list('abcdefghijklmnopqrstuvwxyz')

   s = s.lower()

   for c in s.lower():

       if c in r:

           r.remove(c)  # the first matching instance

   return ''.join(r)

def test_miss_loop():

   for s in test_miss:

       print(s + ':', missing_letters(s))

def main():

   test_dups_loop()

   test_miss_loop()

if __name__ == '__main__':

   main()

6 0
3 years ago
How many passes will it take to find the four in this list?
earnstyle [38]

Answer:

3 is the correct answer

I got correct on my test

7 0
3 years ago
Read 2 more answers
What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
Anuta_ua [19.1K]

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

5 0
3 years ago
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Other questions:
  • Which is not an example of a mobile operating system?
    9·1 answer
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Which domain indicates that a website is sponsored by a university or college?
    12·1 answer
  • Which of the following keywords is used to remove a row in a table? (Points : 2) DROP
    11·1 answer
  • What is HTML? (list down any 5 points)
    12·1 answer
  • Project introduction​
    14·1 answer
  • What types of printed information are useful to obtain from your target employers?
    5·1 answer
  • write code to print out all combinations of pairs of numbers 1 through m and 1 through n, separated by a comma
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!