1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
5

Windows stores information from the Credential Manager application in secure folders called

Computers and Technology
1 answer:
Delicious77 [7]3 years ago
8 0

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
You might be interested in
A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The
Aloiza [94]

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:

3 0
3 years ago
Some scientists say that robots my become self - aware in the near future Do you think this is possible?​
galben [10]

Answer:

i believe that robots could become self aware because its called artificial intelligence, and that means that they can pretty much think for themselves

Explanation:

its just my opinion but i hope i helped!

6 0
3 years ago
Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
Monica [59]

Answer:

ok very surprised to hear that

5 0
3 years ago
What is a spreadsheet​
Delicious77 [7]
A spreadsheet function that indicates the average of a group of numbers in a range.
8 0
3 years ago
Does a triangle with sides of lengths 1.5 ft, 2.5 ft, and 2 ft form a right triangle? How do you know?
timama [110]

Answer:

Yes, the side lengths of 1.5, 2.5, and 2 ft form a right triangle.

Explanation:

Before we solve this problem, we need to know a couple of things.

In a right triangle, you have two legs and a diagonal line that goes from one leg to the other or from one side to the other. This line is called the hypotenuse. It is the longest side of a right triangle. This length can be calculated by using a special formula that is over a thousand years old.

The formula is called the Pythagorean Theorem.

The formula states that if you square one leg and the other leg and add it up. You get the side of hypotenuse which is squared as well.

Here it is in simple terms: a^{2} +b^{2} =c^{2}.

a and b are your two legs.

C is your hypotenuse.

In this case 1.5 and 2 are your legs and 2.5 is your hypotenuse since it is the longest side.

Before we calculate, there is a converse to the Pythagorean Theorem.

If a^{2} +b^{2} \neq c^{2}, then it is not a right triangle.

Lets make 1.5 for a

and 2 for b.

We know 2.5 is for c.

Here it is.

1.5^{2} +2^{2} =2.5^{2}. The / means it is a fraction.

1.5 squared is 9/4 and 2 squared is 4. Add 4 and 9/4 and you get 25/4 squared. Take the square root of 25/4 and you get 5/2.

5/2 is equal to 2.5, so the Pythagorean Theorem applies to this triangle. Therefore, these side lengths do form a right triangle.

Hope this helps!

3 0
3 years ago
Other questions:
  • What is binary number
    11·1 answer
  • Assume you have taken another square picture with the 25-megapixel digital camera discussed in the previous question. This time
    8·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • Sales representatives want to capture custom feedback record details related to each Account. The sales reps want to accomplish
    12·1 answer
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • What's the smallest part of a computer
    8·2 answers
  • Convert 12 bits to bytes​
    13·1 answer
  • Flash drive / USB is ___________ device. A)Input B)Output C)Internal D)None of these
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!