1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
11

Need help . business and technology

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
6 0

Answer:

Use the percentage field option

Explanation:

It is more scientific and it will make it easier to understand

You might be interested in
Focusing on a target market makes it harder to develop products and services that specific groups of customers want.
Sloan [31]

Answer:

ikr so true

Explanation:

5 0
3 years ago
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
Hich chip contains the information necessary to start the computer system?
Sindrei [870]
The BIOS contains the information.
7 0
3 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
When do you use a for loop?
AleksandrR [38]

Answer:

You use a for loop when you know how many times you want to run the loop

Explanation:

if you dont know, use a while loop

6 0
2 years ago
Read 2 more answers
Other questions:
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • _________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
    9·1 answer
  • Rate is how fast a screen updates the information being displayed.
    6·2 answers
  • Help me if you do then you get 10 points and brainliest
    5·1 answer
  • Write a Python program to balance a checkbook. The main function needs to get the initial balance, the amounts of deposits, and
    5·1 answer
  • What are the functions of the windows button, Task View and Search Box? give me short answer
    15·1 answer
  • Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed
    6·1 answer
  • What term is commonly used to refer to HTML formatting?
    5·1 answer
  • Lena is completing her senior year of college and is living in an apartment with three friends. Her family has a subscription to
    14·1 answer
  • Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!