1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
6

A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of

these types of diagrams?
A.
They describe the behavior of a system.
B.
They include sequence diagrams.
C.
They show collaborations among objects.
D.
They include component diagrams.
Computers and Technology
1 answer:
kotykmax [81]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
Can someone help me explain Nvm scheduling in operating systems?
Marat540 [252]

Low-power and short-latency memory access is critical to the performance of chip multiprocessor (CMP) system devices, especially to bridge the performance gap between memory and CPU

3 0
3 years ago
What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
Nimfa-mama [501]
Computer Virus is the most common threat next fraud, hackers
6 0
3 years ago
2. The internet offers a great source of information; however, how are
olga2289 [7]

Answer:

There are many different ways that you can ensure that the information you gather on the internet is reliable and accurate! One way is to not look at Wikipedia and sites where anyone has the access to edit it at any time. Sites that are .com or .org are usually from a direct and safe source. Stay away from media websites and if you believe something isn't right, do further research.

Explanation:

Hopefully this helps.

6 0
3 years ago
You must configure a certificate authority on your network to use EFS. True or False?
Westkost [7]

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

6 0
3 years ago
PLEASE HELP! Please dont answer if your going to guess
meriva

Answer:

r

Explanation:

I literally learned this today when trying to make a python server with an html file:)

6 0
3 years ago
Read 2 more answers
Other questions:
  • List the six external parts or "peripherals" of a computer system and identify which are the output and which are the input devi
    6·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
    8·1 answer
  • A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk
    14·1 answer
  • What is the importance of server modules and add-ons?
    9·1 answer
  • - Discuss the input-process-output model as it relates to program development.
    12·1 answer
  • Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the word
    10·1 answer
  • Which tab contains the Spell Check feature?
    7·2 answers
  • What is a Type 10 SD card?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!