1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
12

Enumeration can be used to discover all but which of the following types of information?

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

You might be interested in
Hey should I get a r()blox gift card if so what amount 5 dollars 10 or 100
IRINA_888 [86]

Answer:

yes you should get a 10 bc it not to much and u can still get something cool

6 0
3 years ago
What is one reason why a business may want to move entirely online?
andrezito [222]

Answer:

To focus on global market

Explanation:

Hope this helps! :)

3 0
3 years ago
The open items on your computer are displayed here.
koban [17]
The GUI or Graphical <u /><u></u><em />User Interface.
7 0
3 years ago
QUICKLY PLEASE!!!
Elza [17]

Answer: As the conventional etiquette, which lays out rules of ethics in social contexts, the purpose of netiquette is to help create and sustain a friendly, relaxed and productive atmosphere for online contact, as well as to avoid putting pressure on the system and creating tension between users.

Explanation:

7 0
3 years ago
What is network management?
melamori03 [73]
Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  <span />
3 0
3 years ago
Other questions:
  • At what point is an idea protected by copyright?
    7·2 answers
  • When creating an input control (for example, a button) on a form the _____________ indicates the data that is contained in the n
    13·1 answer
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all pla
    9·1 answer
  • Debug the following program.
    5·1 answer
  • Choose the parts of the browser window. PLEASE ANSWER QUICKLY TEST
    12·2 answers
  • Which of the following statements about ip addresses is true?
    5·1 answer
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
  • Using a wireless technology known as ___, many smartphones can now be tapped on special payment devices to complete your purchas
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!