1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput

er network but is unable to send digitally signed or encrypted e-mail. What does the security administrator need to perform?
Computers and Technology
1 answer:
Lady_Fox [76]3 years ago
5 0

Answer:

The answer is "The global Address List (GAL) is publishes in the new certificates".

Explanation:

Describe the GAL with relate to smart card:

  • The GAL is a part of the outlook, that allows the users to make a group of mutual contacts and resources specified for your G Suite domain and searchable directory.  
  • It provides the main mail app, that offers you to make global contacts, and also provides basic contact, with the use of business shares global addresses with others.  In this process, the co-worker can change their smart card.
You might be interested in
Using Sequential Search on an array of size n, the search key is definitely present in the array. The probability of matching th
MissTica

Answer:

(11n-5) / 12 is correct answer.

Explanation:

The Probability that key will match to nth term = 1/2

The Probability that key will match to n-1th term = 1/3

As all other probabilities are equal

The Total Probability that key matches to any of 1 to n-2 index = 1 - 1/2 - 1/3 = 1/6

The Probability that key matches to any of 1 to n-2 index = (1/6) / n-2 = (1/6)* (n-2))

Let P(i) = Probability that key matches to ith index.

The Average time complexity = 22 i=1 P(i) * i

The Average time complexity = 1/(6(n-2) * ( sum of 1 to n-2 ) + (n-1) / 3 + n/2

The Average time complexity = 1/(6(n-2) * ( n-2)*(n-1) / 2 + ( n-1) / 3 + n/2

The Average time complexity = 1/6 * (n-1)/2 + (n-1)/3 + n/2

The Average time complexity = (n-1)/12 + (n-1)/3 + n/2

The Average time complexity = (n-1 + 4 * n - 4 * 1 +6 * n)/12

The Average time complexity = 11n-5 / 12

so (11n-5) / 12 is correct answer.

7 0
3 years ago
Answer quickly!!!
ioda

Answer: Harry should check that font he has used are readable on every page and element of his website


Harry should check that all images have alt texts

Explanation: edmentum

7 0
2 years ago
1 Which one of the following is a transmission
ElenaW [278]

Answer:

d

Explanation:

All of the above can be means by which signals or information is transferred.

5 0
2 years ago
Are psn cd keys region free? If not where can I get one in my region?
Andrews [41]
This isn't school related but I'm still gonna help you so you should check the location to see if it's set to be in China if it isn't change it to China if that doesn't work I would just recommend calling customer service if you can.
3 0
3 years ago
Read 2 more answers
Which describes a composite primary key? Check all that apply.
Gemiola [76]
A composite primary key applies to more than one field.  <span>A table can have only one primary key, which may consist of single or multiple fields.</span>
A composite primary key is selected from Design view.  <span>In Design </span>view<span>, you can use the </span>Primary Key<span> button to assign or remove the </span>primary key<span> designation for the </span>selected<span> field or fields.</span>
4 0
3 years ago
Other questions:
  • Java - Given a String variable response that has already been declared, write some code that repeatedly reads a value from stand
    12·1 answer
  • The data I collect in Google Forms are all compiled in a spreadsheet for me.<br> False <br> True
    12·2 answers
  • ​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus
    13·1 answer
  • It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an
    6·2 answers
  • Consider the following constructor for an immutable matrix ADT:
    8·1 answer
  • What is mendix about?
    10·1 answer
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • What is a computer and what is the work of it​
    5·2 answers
  • Which open-sourced packet capture tool uses linux and mac os x operating systems?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!