1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zolol [24]
3 years ago
10

o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra

duplicates are made. Maintain strict control over master keys and control keys. Ensure that the key cannot be linked to the lock it operates.
Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
You might be interested in
What are the consequences of having unprotected Linux operating systems installed on embedded systems?
Gennadij [26K]

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

6 0
3 years ago
Задание: Построить иерархию классов в соответствии с вариантом задания. Построить диаграммы классов.
BabaBlast [244]

Answer:

hey what's the language can't understand

6 0
2 years ago
If there is no computer how would human beings have performed the workk
Katena32 [7]

I’m pretty sure we would do things at the agency would do it because overall th i’m pretty sure we would do things at the agency would do it because overall the agents were actually much smarter than we are literally right now and someways because they use more organic and natural and a whole things like herbs Escentuals would help you more than the chemicals in the flu shots that we take and have chemicals and are bad for the body

3 0
3 years ago
Write a C++ program that computes the area and perimeter of aspecified shape
leonid [27]

<u>C++ program that computes the area and perimeter of a specified shape</u>

#include <iostream>

#include <cmath>

using namespace std;

void rectangle() //Defining function for rectangle

{ int h,w;

cout << "Enter height: ";

//taking input

cin >> h;

cout << "Enter width: ";

cin >> w;

cout << "The perimeter of the rectangle is " <<2*h+ 2*w << " and the area is " <<h*w << endl;  //printing output

}

void triangle()  //Defining function for triangle

{ int s1,s2,s3,h,w;

cout << "Side 1: ";  //Taking input

cin >> s1;

cout << "Side 2: ";

cin >> s2;

cout << "Side 3: ";

cin >> s3;

cout << "Enter the height: ";

cin >> h;

cout << "Enter the base length: ";

cin >> w;

cout << "The perimeter of the triangle is " <<s1+s2+s3 << " and the area is " <<(.5)*w*h << endl; //printing output

}

void circle()//Defining Function for the circle

{

const double p=3.14;

int w;

cout << "Enter the radius: "; //Taking input

cin >> w;

cout << "The perimeter of the circle is " << p*2*w << " and the area is " << p*w*w<< endl;  //printing output

}

int main()  //driver function

{

int s;

cout << "Enter the shape (1 for rectangle,2 for triangle, 3 for circle): ";

//Asking user for the shape

cin >> s;

switch(s)  //checking which shape it chooses

{

case 1:

rectangle();  //If user type 1 ,then calling rectangle function

break;

case 2:

triangle();   //If user type 2 ,then calling triangle function

break;

case 3:

circle();  //If user type 3,then calling circle function

break;

default:

cout <<"Enter valid choice for shape";  //If user type other than 1,2,3

}

return 0;  

}

<u>Output</u>

Enter the shape (1 for rectangle,2 for triangle, 3 for circle): 1

Enter height:2

Enter width: 3

The perimeter of the rectangle is 10 and the area is 6

<u />

4 0
3 years ago
Open IDLE. Create a new script file (File--&gt;New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name
Lorico [155]

Answer:

program:

#your name

print("{:10} {:10} {:10}".format("Number","Square","Cube"))

print("{:<10} {:<10} {:<10}".format(0,0,0))

print("{:<10} {:<10} {:<10}".format(1,1,1))

print("{:<10} {:<10} {:<10}".format(2,2**2,2**3))

print("{:<10} {:<10} {:<10}".format(3,3**2,3**3))

print("{:<10} {:<10} {:<10}".format(4,4**2,4**3))

print("{:<10} {:<10} {:<10}".format(5,5**2,5**3))

print("{:<10} {:<10} {:<10}".format(6,6**2,6**3))

print("{:<10} {:<10} {:<10}".format(7,7**2,7**3))

print("{:<10} {:<10} {:<10}".format(8,8**2,8**3))

print("{:<10} {:<10} {:<10}".format(9,9**2,9**3))

print("{:<10} {:<10} {:<10}".format(10,10**2,10**3))

output:

Number Square Cube

0 0 0

1 1 1

2 4 8

3 9 27

4 16 64

5 25 125

6 36 216

7 49 343

8 64 512

9 81 729

10 100 1000

6 0
2 years ago
Other questions:
  • There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing
    15·2 answers
  • What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
    13·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • What is a slide master ?
    8·2 answers
  • Write a procedural programming loop.. Your loop should start variable n with a value of 10 and count down to zero. The loop shou
    10·1 answer
  • What settings are available in the Properties dialog box of a message? Check all that apply.
    6·2 answers
  • PLEASE HELP
    14·1 answer
  • What defines the scope of a project?
    5·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!