1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
4 years ago
10

What could prevent earmuffs from providing your ears good protection from noise?

Computers and Technology
1 answer:
uranmaximum [27]4 years ago
3 0
Well for one thing, ear muffs were made to keep your ears warm, not protection from noise.
You might be interested in
When a cpu executes instructions as it converts input into output, it does so with _____.
crimeas [40]

Answer:

1. control unit

2. arithmetic logic unit

Explanation:

3 0
3 years ago
Which trait can be a positive or negative?
N76 [4]

Answer:

Prejudice can be either positive or negative.

4 0
3 years ago
What is computer hacking?
tangare [24]

Answer:

<h3><u>Computer hacking:-</u></h3>

  • Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

  • Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.
6 0
3 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
How you will install an operating system on your computer
defon
Someone can install an operating system by disk or removable storage media.

Disk being floppy, tape or commonly a DVD.

Removable storage being a USBdrive.
5 0
3 years ago
Other questions:
  • What is last mile in VOIP
    13·1 answer
  • To protect your answers after completing an assignment, what should you do? close your browser window. let someone else start wo
    14·1 answer
  • The shortest-route technique would best be used to determine the amount of LAN network wiring within a building. determine the p
    12·1 answer
  • How does heat affect quantum computers ?
    10·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • When subscripts are used to specify character positions in a string the first character subscript is 0?
    5·1 answer
  • You may have noticed that the DHCP request that Phil-F¢s iMac sends is a broadcast packet, sent to Ethernet address: ff:ff:ff:ff
    5·1 answer
  • What is the different between a computer and a phone?​
    15·1 answer
  • Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and
    12·1 answer
  • Pls help I will give points
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!