1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
12

What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web appl

ications?
Computers and Technology
1 answer:
nalin [4]3 years ago
4 0

Answer:

SAML.

Explanation:

SAML seems to be an accessible standardized XML-based for some of the sharing of validation and verification details and has been generally implemented for the web apps and it seems to be a design that would be SSO. Verification data is shared via XML documentation which are securely signed. So, the following answer is correct according to the given scenario.

You might be interested in
Which piece of personal information do websites often require users to enter?
andrey2020 [161]

The most common type of information that a website will ask you for is a password, which is unique to that site.

Eye color is irrelevant for sites since there are only about 5 possible colors for human eyes. Most of the time there is no practical use for that information.

Location is mostly irrelevant since your location can change when you visit a site. If it is asking you for it, it's mostly for a special feature unique to that site.

Name is a close answer, but not all websites will ask you for your actual name. Instead, they will ask you for a custum username instead which is different.

8 0
3 years ago
Read 2 more answers
Help users calculate their car's miles per gallon. Write a program to allow a user to enter the number of miles driven and the n
stiks02 [169]

Answer:

The Raptor program for this question is given in the attachment below.

Explanation:

  • Run a loop until user decides to quit the program.
  • Get the number of miles and gallons from user as an input.
  • Use the formula to calculate miles per gallon.
  • Display the calculated value of miles per gallon.
  • Ask the user if they would like to continue using this program.

8 0
3 years ago
Describe two measures that a school could take to ensure the security of the school network.
Zolol [24]

Answer:

Having a proper firewall that could prevent cyber attacks against black hat hackers, And having good cyber team that has had extensive training and know hows the network operates to ensure smooth sailing for the workers and students. (extra) Ensuring your staff understands the cyber war and knows not to click on malicious links that could allow a cyber crminal in to the network.

Explanation:

BlackHat- Individual that uses his knowlage of computers for malicious use.

Firewall- Enitial intrance into a computer it is a piece of software that have expressions to ensure you are only getting traffic that you have specified on the system and not allowing all traffic on all ports

5 0
3 years ago
Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better main
finlep [7]

Answer: <em>Uninstall utility</em>

Explanation:

From given case/scenario, we can state that Andrea advises Dean to delete unnecessary programs and application from his PC using an uninstall utility. An uninstaller also known as a de-installer, is referred to as a sort of utility software designed in order to remove software or section of it. It is known as opposite of installer. These are mostly useful when components are being downloaded in several directories.

6 0
3 years ago
What is an I-94?
Ilia_Sergeevich [38]

Answer:In my opinion I think its A

Explanation:

Sorry if wrong

8 0
3 years ago
Other questions:
  • Which of the following statements are true about the Internet?
    14·1 answer
  • Which are examples of databases? Check all that apply.
    9·2 answers
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • An application is to be written that would allow students to find out their GPA(double) and their total number of credits (an in
    15·1 answer
  • Which principle of design does a designer apply when they create rhythmic movement in a garment by using recurring pleats or det
    13·1 answer
  • Choose all items that represent HTML characteristics.
    5·2 answers
  • Visual basis,C, C++ and Java are all examples of computer programming ________.
    15·1 answer
  • HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HEL
    15·2 answers
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!