1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
5

__________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter in

to a device to calculate the response number.
Computers and Technology
1 answer:
svp [43]3 years ago
5 0

Answer: Authentication

Explanation:

 Authentication is the mechanism of the challenge response in which it basically allow the server to challenge the user with the number without revealing any password.

Then the user must enter that particular password to enter into the device for calculating the particular response number. Then it basically compute the given response by apply hash function in the server challenge that combine the users password.  

You might be interested in
What is a credit limit? athe required payment to your credit card company. bthe amount of interest you are charged each month. c
Gnom [1K]
I believe the correct answer from the choices listed above is option C. A credit limit is the maximum amount you can charge each billing cycle.  <span>The </span>credit limit<span> on your credit card is the maximum balance your credit card issuer allows. Hope this answers the question.</span>
4 0
4 years ago
Why is body language an important factor in a business meeting
slava [35]

The importance of the body language in business. Body language is a language without spoken words, it is called non verbal communication. We use it all the time in our social life and business life so it is all about gestures movements and expressions made by people to deliver a specific message to other people. Business meetings are all about making a good impression.

5 0
3 years ago
Select the correct answer.
zmey [24]

Answer: data design model

Explanation:

8 0
3 years ago
What is Microsoft marketing ?
vaieri [72.5K]

Answer:

Microsoft Corporation's marketing mix is a showcase of how rapid innovation combines with effective approaches.

Explanation:

Microsoft's current marketing strategy is to drive its enterprise businesses by creating cloud-based solutions that will stick with consumers.

American multinational technology company with headquarters in Redmond, Washington. It develops, manufactures, licenses, supports, and sells computer software, consumer electronics, personal computers, and related services.

6 0
3 years ago
You completed the wireframe step of mobile app development. Which statement is true about this step?
UkoKoshka [18]

The statement that is true about this step is that:

  • You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
  • In this step, you defined your target audience and main goal.

<h3>How wireframe is made to create mobile apps?</h3>

The Steps for wireframing are:

  • Begin by mapping out a specific user flow.
  • Do a Sketch of the core part and then begin wireframing by setting a Mobile Frame.
  • Se the layout using boxes and use design patterns.
  • Make sure to link the pages together to create a flow.

Note that The statement that is true about this step is that:

  • You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
  • In this step, you defined your target audience and main goal.

Learn more about wireframe  from

brainly.com/question/12734458

#SPJ1

5 0
3 years ago
Other questions:
  • In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
    14·1 answer
  • Does virtualization impact the design of programs on behalf of the process/threading model?
    12·1 answer
  • You accidentally moved your task bar from the bottom of the screen to the left side. You would like to
    14·2 answers
  • How do different frequencies (color) of light affect a recorded video image?
    12·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • What is the purpose of including comments in code?
    15·1 answer
  • You've adjusted your bicycle seat so it's centimeters from the ground how high should your handlebars be
    10·2 answers
  • What are the components of a web page???
    9·2 answers
  • What are the components of computer system??<br>​
    10·2 answers
  • A computer hacker trying different combinations of characters to crack a password is a ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!