1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
15

kendra is worried about the difference between a security procedure and a baseline. what is the correct definition of eadch

Computers and Technology
1 answer:
inna [77]3 years ago
5 0

Answer:

The answer is below

Explanation:

Security Procedure is a term often used in Computer Science, to describe strategies and techniques employed in confirmation or recognizing differences in electronic data of various individuals. It involves the application of codes and other sequential calculations to carry out this procedure.

While baseline is a term often used in computer to describe a set of characteristics of a product or a form of the reference point in which comparison can be made for various products of similar characteristics. It can also mean the starting point of project work.

You might be interested in
When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variab
Goryan [66]

The lifespan of a global variable (also known as a "field" or "class" variable) exist only until any additional classes are initialized.

<h3>What is Windows form application?</h3>

Windows Forms is defined as a form of UI backbone that is often uused for creating Windows desktop apps.

It is known to help its user in a lot of ways to produce or make  desktop apps using  the visual designer given in Visual Studio. It has a lot of Functionality such as drag-and-drop placement of visual controls and others.

See full question below

When you run your Windows Form application, what is the lifespanof a global variable (also known as a “field” or “class”variable)?

a. during the initial click button event

b. global variables only exist if they are constants

c. only until any additional classes are initialized

d.as long as the form is running

Learn more about Windows  from

brainly.com/question/26420125

5 0
2 years ago
Hydraulic systems use liquids because _____.
icang [17]

Hydraulic systems use liquids because they are incompressible.  The incompressible fluid is used for transmission of the force that is applied at one point and is transmitted to another point. Due to the use of this force, and depending on how it’s applied, operators can lift heavy loads, and precise repetitive tasks can be easily done. The power of liquid fuel in hydraulics is significant and as a result, hydraulic are commonly used in heavy equipment.

8 0
3 years ago
Read 2 more answers
An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
Alex73 [517]

Answer:

Set-NetIPInterface

Explanation:

this modifies the ip and the DHCP

3 0
4 years ago
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Sveta_85 [38]

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

4 0
3 years ago
If you play gta and don't know the song ''Glamorous'' Then what do you even do when you play?
Paraphin [41]
You literally don’t do anything you’re just like dead of sun
4 0
3 years ago
Read 2 more answers
Other questions:
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • What are the main differences between a workgroup and a domain?
    14·2 answers
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • I need a good science fair name I’m doing a homemade water filter and I have no idea what the title should be plz help
    14·1 answer
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!