1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
4 years ago
8

The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or

not and whether the use and provision of services should depend on the security feature."
Computers and Technology
1 answer:
quester [9]4 years ago
4 0

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

You might be interested in
1.
Brums [2.3K]

Answer:

as

is so good

Explanation:

7 0
3 years ago
What does this result prove about the computer’s network connectivity?
Anna007 [38]
It can prove or disprove the fact that your computer is connected it the internet by in turn whether you can do almost anything
7 0
3 years ago
Many organisms spend most of their life cycle in the diploid state. If meiosis produces haploid cells, how is the diploid number
den301095 [7]

Answer:

The correct answer to the following question is "By fertilization".

Explanation:

Fertilization seems to be the mechanism or process whereby genders (Females or males) gametes are mixed simultaneously, causing a fresh organism to create.

  • Several species invest the bulk of their development process in a diploid form.
  • If genetic recombination or meiosis creates haploid organisms, the number of diploids preserved by fertilization for certain kinds of species.

6 0
3 years ago
What does complex sorting allow that simple sorting does not?
Leona [35]

According to apex the answer is data can be separated into two different fields

5 0
3 years ago
Read 2 more answers
Write an algorithm to find perimeter of circle<br>​
Anna11 [10]

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

6 0
3 years ago
Other questions:
  • What statement is used to close a loop started with a for statement?
    8·1 answer
  • Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
    9·2 answers
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • Which of the following Office Online apps is most effective for creating multi-media presentations
    15·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • What do space stations, artificial organs, supersonic aircraft, and "high-tech”
    10·1 answer
  • What does this mean in python?
    5·1 answer
  • What is a functional organisation? and how it functions​?
    12·1 answer
  • What is it called when you define a variable for the first time
    12·2 answers
  • Match the column.<br> Description Shortcut key<br> Move to next cell in row page up
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!