1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
15

¿Que entiendes por computadora? Me urgeee

Computers and Technology
1 answer:
cricket20 [7]3 years ago
5 0
Que es lo que quieres decir mi amigo
You might be interested in
For some reason i cant see brainly answers
denis23 [38]

Answer:

Same thing happening to me and several other people. At this point I wonder if there site is having troubles. I tried to email them but even that is not working.

Explanation:.

4 0
3 years ago
What online game do you play on the internet and can I play with you on it? I play downtown mafia 1960
SashulF [63]

Answer:

None

Explanation:

I find them scary and they give me nightmares

6 0
2 years ago
If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and seq
brilliants [131]

Answer:

A. True.

Explanation:

Authentication in computer technology can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

Hence, if the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

<em>This simply means that, when a user enters his or her private key (password); the authenticator matches the private key to the uniquely defined credentials. Permission and access is granted by the authorization system right after a successful authentication. </em>

8 0
3 years ago
A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent fr
Keith_Richards [23]

Answer:

Packet

Explanation:

8 0
3 years ago
A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw
svetoff [14.1K]

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

7 0
2 years ago
Other questions:
  • To create a formula in ___ you would first click in one of the cells. A.word b.excel c.facebook d.powerpoint
    13·1 answer
  • The ____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
    15·1 answer
  • Which of the following statements most accurately describes the difference between aptitudes and skills?
    8·1 answer
  • Create and execute a SELECT statement that would provide data for a vendor directory. Display should include vendor number, vend
    13·1 answer
  • Which statement correctly compares blank presentations and themed presentations?
    12·2 answers
  • A growling noise is heard only when the driver exerts force on the clutch pedal. No noise is heard when the clutch pedal is up.
    14·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • Plz answer this....quickkkkk​
    7·2 answers
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • "code is broken down by the computer until it is in _____and is a very long series of ons and offs
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!