1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
4 years ago
5

1. asynchronous_communication

Computers and Technology
1 answer:
algol [13]4 years ago
3 0
Communications in which data can be transmitted intermittently rather than in a steady stream.
You might be interested in
Explain briefly why people often have a pretty good understanding of computer hardware.
bekas [8.4K]
Some people are computer smart compared to Book smart. Like myself. It all depends if you can sit in front of a screen 12hours a day, You learn quite a bit. But your memory also takes a role in what you know. Especially <span>Visual memory</span><span />
4 0
3 years ago
Which statement below is not true of EFS
ohaa [14]

<em>Statements that do not apply to EFS are statements that EFS cannot store files encrypted. </em>

<h2>Further Explanation </h2>

Encrypting File System or EFS is a core technology (in Windows 2000, XP Professional, and Windows Server 2003) that allows encrypted file storage in a volume formatted using the NTFS file system.

<em>Version of Windows that supports EFS </em>

  • Windows 2000 Family: Windows 2000 Professional, Windows 2000 Server, Windows 2000 Datacenter Server, and Windows 2000 Advanced Server
  • Windows XP Family: Windows XP Professional, Windows XP Professional 64-bit Edition, Windows XP Professional x64 Edition
  • Windows Server 2003 Family: Windows Server 2003 Standard Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Datacenter Edition
  • Windows Vista Family: Windows Vista Business Edition, Windows Vista Enterprise Edition, Windows Vista Ultimate Editon
  • Codenamed Longhorn Windows Server family: Longhorn (all beta versions, as of April 2007, reaching Beta 3 version)

EFS uses several cryptographic algorithms, which are as follows:

  • Data Encryption Standard eXtended (DESX)
  • Triple Data Encryption Standard (3DES)
  • Advanced Encryption Standard (AES)
  • Rivest, Shamir, Adleman (RSA)

Learn More

  1. About Software brainly.com/question/11950006
  2. Type of Data brainly.com/question/10762715

Details:

Grade: Middle School

Subject: Computers and Technology

Keyword: Software, Windows, Encryption, EFS

3 0
3 years ago
Read 2 more answers
Divide (10x^3 + 19x^2 + x - 7) by (5x + 2)​
sesenic [268]

              2x^{2}+ 3x - 1

5x + 2\sqrt{10x^{3} + 19x^{2} + x - 7 }

        <em> </em>- 10x^{3}  - 4x^{2}<em />

        <u>                                     </u>

                       15x^{2} + x

                    -15x^{2} - 6x

       <u>                                       </u>

                                -5x - 7

                                - 5x - 2

       <u>                                       </u>

                                        -5

6 0
3 years ago
Before entering a road from an alley or driveway, you must:Flash your high beam headlights 
JulsSmile [24]

Stop before reaching the sidewalk. Hope this helps

3 0
3 years ago
g Points The critical section cannot be executed by more than one process at a time. false true Save Answer Q3.28 Points The cod
Ira Lisetskai [31]

Answer: Hello your question lacks some details attached below is the missing detail

answer :

a) True , B) False  C) True  D) True

Explanation:

a) True ; The critical section cannot be executed by more than one process at a time

b) False : The code does not satisfy the progress condition, because while loops are same hence no progress

c ) True :  The code satisfies the bounded waiting condition, because of the waiting condition of the while loop

d) True : No matter how many times this program is run, it will always produce the same output, this is because of the while loop condition

7 0
3 years ago
Other questions:
  • 2 Which statement best explains how computers are used to analyze information?
    6·1 answer
  • After a worksheet has been displayed in page layout view, page breaks are indicated by ________ in normal view.
    14·1 answer
  • What is a service-oriented architecture? Group of answer choices A business-driven enterprise architecture that supports integra
    13·1 answer
  • In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional
    7·1 answer
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
  • When a person's personal information is collected by other parties, it refers to the issue of
    14·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!