1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
12

Enumeration can be used to discover all but which of the following types of information?

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

You might be interested in
In your own words, explain what it means to “buy low, sell high.”
Georgia [21]

Answer:

Resell value should be high like buying a used car for a low price fixing it a bit and double your money.

Explanation:

7 0
3 years ago
Read 2 more answers
------------ is the process of communicating informationto lots of people at once e.g. via television, radio ornewspapersIntrape
balandron [24]

Answer:

Mass Communication

Explanation:

Mass Communication is the process of communicating information to lots of people at once.

6 0
3 years ago
Read 2 more answers
What is a collision in a hash table?
Maru [420]

Answer: Collision is defined as the event that takes place when the clash appear due to the information persisting the same hash value get in contact. This mechanism occurring in the hash table is called collision and is dependent on the type of application.

Collision becomes difficult to be avoided in a large set of the hash table as the data set is difficult to be found while in small hash table it is still detectable but cannot be avoided completely.

7 0
3 years ago
Walter has an associate's degree in computer science and aspires to become a web developer. Which certification will help enhanc
bezimeni [28]

Answer:

Your answer to this problem would be E. SAS Certified Base Programmer.

Programming would have to come before all of these when it comes to making a web devolving program.

3 0
3 years ago
Tiny charts embedded in a cell that display a visual trend summary alongside your data are called ________.
bulgar [2K]
<span>The name for the tiny charts found in the background of a cell that displays visual trend summaries along with your data is sparklines. Sparklines can also be embedded in maps, spreadsheets, headlines, and other places. They make it easier to spot trends in the information you're studying.</span>
7 0
3 years ago
Other questions:
  • MinMax is a function that takes five arguments and returns no value. The first three arguments are of type int. The last two arg
    14·1 answer
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • What best describes the kinds of online items that are usually protected by copyright law?
    10·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server i
    11·1 answer
  • Which number is equivalent to 17e3?<br><br> 17000.0<br> 1700.0<br> 0.017<br> 0.17
    8·1 answer
  • How do spear phishing attacks differ from standard phishing attacks?
    5·1 answer
  • ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!