1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
4 years ago
5

Which are among the ways you can use bitlocker encryption? (choose all that apply?

Computers and Technology
1 answer:
igor_vitrenko [27]4 years ago
3 0
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
You might be interested in
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 < 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
3 years ago
Differences between placeholders and textbook in PowerPoint ​
Igoryamba

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

4 0
3 years ago
Why OSI is called open system?
MAXImum [283]

Answer: OSI system is called Open System Interconnection because It provides the collection of protocols for the connection of different system to connect with  any dependence on any other system or network.

Explanation: Open system interconnection establishes a connection between the different system for the communication purpose using several protocols and software standards .It has no dependency or any network or other system to do the functioning and works using the seven layers of the OSI architecture.Thus, that is why OSI system known as open system.

7 0
3 years ago
Write a program to implement the algorithm that you designed in Exercise 21 of Chapter 1. Your program should allow the user to
Murrr4er [49]

Answer:

total = 0

items = int(input("Enter the number of items ordered: "))

for i in range(items):

   price = float(input("Enter the price of item " + str(i+1) + ": "))

   total += price

if total < 200:

   total += (items * 10)

   

print("Bill is $" + str(total))

Explanation:

*The code is in Python.

Ask the user to enter the number of items ordered

Create a for loop that iterates depending on the number of items ordered. Inside the loop, ask the price of each item and add it to the total

After the loop, check the total. If it is smaller than 200, add 10 for each item to the total

Print the total

4 0
4 years ago
A standardized specification of a motherboard (including its dimensions, supported power supply types, and layout of components)
Alik [6]
The correct answer is 'Form Factor'. The standardized specification of a motherboard ( including it's dimensions, supported power supply types, and layout of components) is know as the motherboard's form factor.
5 0
3 years ago
Other questions:
  • A _______ is used to present data in a simplified, graphical format that allows your audience to read less text while still bein
    9·2 answers
  • Are the ways data is represented and transmitted with computers laws of nature or laws of man?
    10·1 answer
  • A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
    10·1 answer
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • You should structure the first before you search for a relevant picture.
    8·1 answer
  • What are the basic features of Usenet group
    15·1 answer
  • The rate of flow is called
    11·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!