1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
14

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified len

gth of inactivity.A. TrueB. False
Computers and Technology
1 answer:
zepelin [54]3 years ago
4 0

Answer: True.

Explanation:

Terminal resource security is the type of security that automatically logs out it user due to a period of inactivity. Setting up a password for a terminal resource security requires combining characters, symbols and numbers, it must be noted that how vulnerable the system will be is determined by the strength of it password.

There are certain programs that still grant access to their users during certain time of inactivity, this is mainly to reduce the cases of break-in attempts during time off.

You might be interested in
P**nhub or x-videos or other
Colt1911 [192]
U shouldnt be watching them, Idc how old u are.
3 0
3 years ago
The term used to describe an electronic device, operating under the control of instructions stored in its own memory, that can a
nlexa [21]
The answer to this is Computer!!
3 0
3 years ago
On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
12345 [234]
The user can use the Play store on there android device
3 0
3 years ago
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
Zielflug [23.3K]

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

7 0
4 years ago
Please an urgent answer<br>will give brainliest<br>what is the definition of bucket address.​
zmey [24]
Is this technology? Let me know so I can help you!!
3 0
3 years ago
Other questions:
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • In 2-3 paragraphs, identify at least two ways technology and innovation have affected global economic competition. Provide a spe
    5·1 answer
  • What's the name of this apex legend hero​
    13·2 answers
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
    9·1 answer
  • What necessarily happens when a photographer chooses to give either the aperture or the shutter speed priority?
    10·1 answer
  • What would a bar graph best be used for? State why and give 2-3 examples of things you could demonstrate with a bar graph
    5·1 answer
  • What is the meaning of FTTH
    9·2 answers
  • The first person to say something in here will get brainliested.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!