1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
15

What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's

profile but within the organization-wide trusted ip range?
a. the user will be able to login without activating the computer.
b. the user will be able to login after answering a security question.
c. the user will be able to login after the computer is activated.
d. the user will not be able to login at all?
Computers and Technology
1 answer:
podryga [215]3 years ago
7 0

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

You might be interested in
You're a ticket agent for a commercial airline and responsible for checking the identification for each passenger before issuing
algol13

Answer:

Follows are the code to this question:

import java.util.*;//import package for user input  

public class Main //defining class  

{

  public static void main(String[] as)//main method

  {

      boolean x,y,z;//defining boolean variable

      Scanner ox= new Scanner(System.in);//create Scanner class object for user input

      System.out.println("input value: "); //print message  

      x=ox.nextBoolean();//input value

      y=ox.nextBoolean();//input value

      z=ox.nextBoolean();//input value

      System.out.println("Output: ");//print message

      System.out.println(x || (y &&z));//use print method to check value and print its value  

  }

}

Output:

1)

input value:  

true

false

false

Output:  

true

2)

input value:  

false

true

true

Output:  

true

3)

input value:  

false

false

false

Output:  

false

Explanation:

In the given code, inside the class three boolean variable "x,y, and z" is declared, that uses the scanner class for input the value from the user end, and in the next print, the method is declared, that uses " OR and AND" gate for calculating the input value and print its value.

In the AND gate, when both conditions are true. it will print the value true, and in the OR gate, when one of the conditions is true, it will print the value true.  

3 0
3 years ago
What is computer ? What is computer program? What is hard disk.
g100num [7]
A computer is a electronic that helps you access the internet/WiFi
4 0
4 years ago
Read 2 more answers
TODAYS ATTENDANCE QUESTION: Why do you think it is important to be able to measure using a ruler in Technology & Engineering
Vaselesa [24]

Answer:

Because it takes precision to a lot of things in tech and Eng. We need to measure all kinds of things, like wood, metal/etc. for computers and things that we use everyday, Because our world goes around being precise about things that we need everyday, like tables and things.

Explanation:

3 0
3 years ago
The number of colors in a bitmap image determines which category the image will be in. Complete the following sentences.
Jobisdone [24]

Answer:

Explanation:

1.Grayscale

2.Multitone

7 0
4 years ago
What is Communication​
iVinArrow [24]
Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. ... A sending device that initiates an instruction to transmit data, instructions, or information. A communications device that connects the sending device to a communications channel.
3 0
3 years ago
Other questions:
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • How do you delete text from a slide
    14·2 answers
  • Hi <br> What exactly does this project want from me?thanks for riding
    5·1 answer
  • What three steps Name a group??
    14·1 answer
  • A typeface in which each character has the same width and is often used to display programming code is _
    8·1 answer
  • A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
    10·1 answer
  • 5. ADD A STATEMENT OR STATEMENTS to the program on the following page (including constant and/or variable declarations if you wa
    6·1 answer
  • Can change the tab colors of the worksheets in excel
    13·1 answer
  • 24 POINTS!!! <br> Why are Sequences, Selection, and Iteration building blocks of algorithms?
    5·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!