1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
4 years ago
11

​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you

are. What are these called?
Computers and Technology
2 answers:
yuradex [85]4 years ago
6 0

Answer: Authentication factor

Explanation: Authentication factor are the factors that describes about the ingenuity or originality of the user .This is the term that tells about the actuality of user that is getting connected with network by the five elemental question .

The question is regarding the possession, inherency, knowledge/information , identity and location.The answers to these question help in finding the authenticated user.

Aleks [24]4 years ago
6 0

Entering the dark zone of life

You might be interested in
Text filters allow you to create a custom filter to match ________ the text in a field that you specify.
Mazyrski [523]
Answer is all or part of
4 0
3 years ago
Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
never [62]

Answer:

Consider the given data

There are two host S and R communicating over a TCP connection.

Host R received from S all bytes from 1 through 233.

Host S sends three segments to Host R.

The sizes of the three segments are 50, 70, and 90 bytes.

In the first segment, the source port number is 212 and the destination port number is 80.

a)

For segment 1:

As, Host R received 233 bytes from Host S, the sequence number of the first segment is 234.

The source port number = 212

The destination port number = 80.

For segment 2:

As the first segment size is 50 bytes and the sequence number of the first segment is 234, the sequence number of the second segment will be 50+ 234= 284.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

For segment 3:

As the second segment size is 70 bytes and the sequence number of the second segment is 284, the sequence number of the third segment will be 70+ 284= 354.

The source and destination ports of all the segments are same.

The source port number = 212

The destination port number = 80.

b)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 2, 3.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 3. The sequence number of the segment 3 is 354.

Therefore, the acknowledgement number of the second segment arriving is 354.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

c)

In TCP, the acknowledgement number is the sequence number of the next byte to be expected.

The order of the segment arrive at R is 1, 3, 2.

The acknowledgement number of the second segment arriving is the sequence number of the next byte to be expected. The next byte is segment 2. The sequence number of the segment 2 is 284.

Therefore, the acknowledgement number of the second segment arriving is 284.

In the server side, the source and destination ports are swapped.

Then, the source port number = 80

The destination port number = 212.

d)

The first segment acknowledge is the sequence number of the second segment that is lost.

The second and third segment acknowledgements arrive after the timeout interval. The timing diagram of these segments along with their sequence number and the number of bytes of data is shown in the below diagram.

Explanation:

See the attached picture for timing diagram.

4 0
4 years ago
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
4 years ago
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
3 years ago
Most game development is done with object-oriented programming languages
kari74 [83]

I think its b, but not so sure

dont sue me if im wrong please

7 0
3 years ago
Read 2 more answers
Other questions:
  • Use this illustration to answer the question.
    15·1 answer
  • What does ADSL stand for?
    6·2 answers
  • Which of the following aspects of a file can you NOT set by using the Save As dialog box?
    8·1 answer
  • Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
    14·1 answer
  • What is predictive dialing?
    12·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • Explain why you will do these particular things when driving.
    11·1 answer
  • The Brinley website will not let me search for questions anymore. It says “Search all you want in-app” and then covers the quest
    14·1 answer
  • What is the recipe for enchanting table?
    14·2 answers
  • look for ten websites and classify them as static or dynamic what makes each websites static or dynamic?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!