1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
15

You

Computers and Technology
2 answers:
N76 [4]3 years ago
8 0

Answer: A

Explanation: the process or action of verifying the identity of a user or process.

Hope this helps ^.^

Scilla [17]3 years ago
7 0

The Answer would be (A. Authentication) it’s how they find out the authenticity of your identity before they let you in.

Let us know is there is any thing else you need to know.

Mark brainlest :)

You might be interested in
In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
fenix001 [56]

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

3 0
3 years ago
Which part of a formal email is optional
EleoNora [17]
Contact information will be optional.
6 0
3 years ago
Read 2 more answers
My serious question that needs answering pronto!!!
timama [110]

Answer:

It depends on what the button looks like but sometimes you need to press it. If it is an actual computer press the power on button attached to the box that should be hooked up to the computer.

Explanation:

7 0
3 years ago
When you listen to a guitar duet and have trouble hearing the melody, which of the following would best explain the problem?
emmasim [6.3K]

Answer:

One of the guitarists is playing too loud.

Explanation:

My dad plays the guitar...?

I'm shocked it's not "not keeping a steady beat", so I'm certain this is it.

3 0
3 years ago
Read 2 more answers
What are examples of templates the Input Mask Wizard offers? Check all that apply.
Vesna [10]
The answer is A B AND D mark me brainliest?
5 0
3 years ago
Read 2 more answers
Other questions:
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • As a consommé simmers, the meat and eggs coagulate, forming a
    6·1 answer
  • What is the fastest way to move data over long distances using the internet, for instance across countries or continents to your
    13·1 answer
  • you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t
    7·1 answer
  • How does cryptocurrency exchange software works?
    14·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • What is the nearest ten cents of 453.56
    5·1 answer
  • When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res
    7·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!