1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
4 years ago
9

What is transaction model?

Computers and Technology
2 answers:
Alexandra [31]4 years ago
6 0
Cash register 
ATMs
these types of machines
Papessa [141]4 years ago
3 0
For example, from one subsystem and back. It's that simple!!! Hope this helps!!!
You might be interested in
Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
Naddika [18.5K]
Efficiency because if you don't have very good efficiency then somebody can't really read it so they won't know what it's saying.
5 0
4 years ago
You must configure a certificate authority on your network to use EFS. True or False?
Westkost [7]

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

6 0
2 years ago
Write a balanced half-reaction for the oxidation of manganese ion Mn+2 to permanganate ion MnO−4 in acidic aqueous solution. Be
jeka57 [31]

Answer:

The complete reaction is given in the image attached below for better understanding and elaboration

4 0
3 years ago
HOW DO I HACK PUBG MOBILE WITH PROOF <br>GIVE ME LINK​
muminat

Answer:

why do u want to do that i have an acc i dont even use that is so good with so much uc and other skins on it

Explanation:

5 0
3 years ago
Read 2 more answers
TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
kodGreya [7K]

Answer:

2. SSL can interact with its earlier versions which is a vulnerability

Explanation:

TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are both used for providing data authentication and encryption between networking devices  (such as servers, PCs and applications) operating over a network. The iterations of SSL were versions 1.0, 2.0 and 3.0. But then, all these iterations had security issues and so TLS 1.0 was released to improve on those security flaws. And seeing that SSL can interact with its earlier versions which are all vulnerable, downgrading TLS to SSL for compatibility sake will abuse the essence of TLS in the first place.

6 0
3 years ago
Other questions:
  • How does a combustion engine works?
    7·2 answers
  • Define the term Frame Rate.
    12·1 answer
  • William has an internet connection that does not allow him to make calls when connected to the internet. what internet service c
    7·2 answers
  • PLEASE HELP ME ASAP ;(
    15·1 answer
  • Sam wants to use the rule of thirds to capture the essence of his image. How will he apply this rule in his image to get a pleas
    6·1 answer
  • The advantage of using a belt drive over chain drive. vice versa
    12·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • When using the protection options in Excel 2016, what does the Protect Workbook function do?
    8·2 answers
  • What happens if the new context is in memory rather than in a register set and all the register sets are in use?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!