1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
11

For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p

rocess through the use of a secure channel for logon purposes?
Computers and Technology
1 answer:
inessss [21]3 years ago
4 0

Answer:

"NTLMv2" is the correct answer to this question.

Explanation:

The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.

It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.

You might be interested in
The purpose of a database is to help people stop using spreadsheets.
IrinaK [193]

Answer:

Yes, the purpose of a database in a way is to stop people from using spreadsheets but, it is also so much more.

Explanation:

<u>Databases</u> are a vastly improved form of a spreadsheet. They allow Computer Scientists to automatize a company's information. Giving them the ability to instantly add, retrieve, and modify specific information within a database of hundreds or even thousands of entries. All this with little or no human input. Thus saving a company time and money as opposed to using a regular spreadsheet which requires manual input from an employee.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more t
daser333 [38]

Answer:

the gps and a map

Explanation:

3 0
3 years ago
Read 2 more answers
Computer keyboard failures can be attributed to electrical defects or mechanical defects. a repair facility currently has 25 fai
Mariulka [41]
You are going to select 5 keyboards, from a set of 25 defective keyboards. When you select the first keyboard it may be have either electrical deffects or mechanical deffect, this is two possibilities. The same happens with the second, third, fourth and fifth selection. Then  each selection has 2 different possibilities, and the number of possibilities are: 2*2*2*2*2 = 32.

But that is considering that the order matters. This is that it is different that the first has electrical deffects and the others have mechanical defects than the second has mechanical electrical deffects and the other has mechanical deffects.

If you the order is not relevant, then the only different outcomes are:

1) 5 with electrical deffects
2) 4 with electrical deffects and 1 with mechanical deffects
3) 3 with electrical deffects and 2 with mechanical deffects
4) 2 with electrical deffects and 3 with mechanical deffects
5) 1 with electrical deffects and 4 with mechanical deffects
5) 5 with mechanical deffects.

In this case the answer is 6 different ways.

Answer: 6 
5 0
3 years ago
Write a recursive, int-valued method, len, that accepts a string and returns the number of characters in the string.
marin [14]

Answer:

See Explanation Below

Explanation:

We name our recursive function to be "len" without the quotes

Also, the string whose length is to be calculated is named as StringCalc

Please note that only the function is written; the main method is omitted and it's written in Java Programming Language

The recursive function is as follows:

public int len(String StringCalc){

// Check if StringCalc is an empty string

if (StringCalc.isEmpty())

{

return 0;

}

// If otherwise; i.e. if StringCalc is not empty

else{

// Calculate length of string

int lengths = StringCalc.length();

// Return the length of string from the second character till the last

return (1 + len(StringCalc.substring(1, lengths)));

}

}

// End

The first line of the code declares the recursive function

public int len(String StringCalc)

The next line checks if the input string is empty

if (StringCalc.isEmpty())

This can also be written as

if(StringCalc == "")

If the above is true, the recursive returns the value of 0

Else; (i.e. if it's not an empty string), it does the following

It calculates the length of the string as follows

int lengths = StringCalc.length();

The length of the string is saved in variable "lengths"

Then the length of the string starting from the second character is calculated; since the index string is taken as 0, the recursive consider character at index 1 till the last index.

7 0
3 years ago
The place in a digital device where the data and programs that device is currently using are accessible by the processor is call
Novay_Z [31]

Answer:

Ram or random access memory

Explanation:

7 0
4 years ago
Other questions:
  • Explain what might happen if two stations are accidentally assigned the same hardware address?
    15·1 answer
  • Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
    13·1 answer
  • Which of the following apply to the definition of Wide Area Networks? Check all of the boxes that apply.
    7·2 answers
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • Given a PrintWriter reference variable named output that references a PrintWriter object, write a statement that writes the stri
    5·1 answer
  • You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write th
    5·1 answer
  • 1. Pasar los siguientes ejercicios a diagrama de bloque
    11·1 answer
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and
    14·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!