1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
10

What are some of the ways you can use bitlocker encryption? (choose all that apply?

Computers and Technology
1 answer:
nasty-shy [4]3 years ago
3 0
Bitlocker Encryption can be used during the process of authenticating your computer with a TPM, during the process of authenticating your account with a USB flash drive, and most of the authentication through text messages.
You might be interested in
Which of these improved the ability to send information over the network in the 1970s?
frez [133]

Answer:

b. ethernet

Explanation:

It was an ethernet that was developed in the 1970s that improved the ability to send the information over the network. It is the most widely used method to connect the computers in a LAN or the local area network, ever since 1980 when it was first introduced for commercial use. And it is being used in bulk even today.

4 0
2 years ago
If you want to refine your google search results by date which option should you use
jeka57 [31]
You should use the Tools option and then click Anytime and then select  custom range
7 0
3 years ago
Read 2 more answers
Name this:<br><br>Software that allows us to create dynamic slide presentations. ​
PtichkaEL [24]
I think it is presentation
4 0
2 years ago
1. Realizați o schemă logică pentru un algoritm care sa calculeze suma primelor
DIA [1.3K]

Explanation:

The clear rendering reads;

"1. Make a logic diagram for an algorithm to calculate the sum of premiums 100 natural numbers.

2. Make a logic diagram that displays a maximum of 2 natural numbers.

3. Make a logic diagram that displays the square of a natural number".

4 0
3 years ago
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of m
devlian [24]
The answer you're looking for is
Rootkit

I hope this helps! :)
6 0
3 years ago
Other questions:
  • Image files are grouped into two categories: _____.
    5·1 answer
  • Forms open in _______, which provides a user-friendly interface for entering data.
    11·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • Using e-mail has decreased the number of hand-written letters that people send to their friends and relatives. this is a ____ fu
    11·1 answer
  • What aviation first is janice brown credited with
    10·1 answer
  • The basic difference between RAM and ROM memory is: Question 5 options: A) RAM is nonvolatile while ROM is volatile. B) RAM is r
    11·1 answer
  • Yall tryna play gta later? I play on ps4
    12·2 answers
  • What is output if month = 11 and day = 14?
    13·2 answers
  • What is the most efficient<br> form of transportation we<br> have?
    13·2 answers
  • A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amoun
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!