1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
15

You

Computers and Technology
2 answers:
N76 [4]3 years ago
8 0

Answer: A

Explanation: the process or action of verifying the identity of a user or process.

Hope this helps ^.^

Scilla [17]3 years ago
7 0

The Answer would be (A. Authentication) it’s how they find out the authenticity of your identity before they let you in.

Let us know is there is any thing else you need to know.

Mark brainlest :)

You might be interested in
You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
fgiga [73]

functions

is the correct answer of your question ^_^

8 0
3 years ago
What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
tester [92]

Answer:

Provision of both audio and video

,dedicated support

Explanation:

Free services are not dedicated digital lines so there is no guarantee of high-quality sound or a reliable connection during the call. Some common issues  are background noises, crackling, echoes, distortion, quietness and drop-outs.Free services also don't offer dedicated support so if anything goes wrong there's nobody available to help you. Any of these problems can ruin the productivity and flow of your meeting.

5 0
3 years ago
A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
Kaylis [27]

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term <u>protected </u>computers for federal interest computers so that the statute now protects any computer attached to the Internet.

<h3>What is the National information infrastructure protection act?</h3>

It is an amendment act of Computer Fraud and Abuse Act and was enacted in 1996. The act is for the cyber crimes and frauds.

Thus, the correct option is protected.

Learn more about National information infrastructure protection act

brainly.com/question/13371540

#SPJ1

3 0
2 years ago
An automotive engine's camshaft rotates at
notka56 [123]
C)

An automotive engine's camshaft rotates at one-half the speed of the crankshaft.
6 0
4 years ago
Read 2 more answers
Python Question: write a program that generates a random number in the range of 1 through 100, and asks the user to guess what t
natima [27]

Answer:

import random

arr=[]

for i in range(100):

   arr.append(i)

while True:

   answer=random.choice(arr)

   guess=int(input("enter your guess number between 0-100: "))

   if answer is guess:

       print("right guess\ncongratulations.....")

       print("the answer was: "+str(answer))

       break

   elif guess < answer-20:

       print("you guessed too low....\ntry again")

       print("the answer was: "+str(answer))

   elif guess > answer+20:

       print("you guessed too high....\ntry again")

       print("the answer was: "+str(answer))

   else:

       print("incorrect guess\ntry again")

       print("the answer was: "+str(answer))

Explanation:

6 0
3 years ago
Other questions:
  • A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks
    11·2 answers
  • Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
    5·1 answer
  • ____ is a general term that includes all products of the human mind, including original ideas.
    5·1 answer
  • Which of the following is not a component of Google Display ads' value proposition?
    9·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • A new coffee shop has problems maintaining inventory. It approaches a software developing team for a program to cater to their s
    7·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • A) Write "T" for true statement and "F" for false statement.
    9·1 answer
  • Question # 2
    6·1 answer
  • What is e banking effects
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!