1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
5

Windows stores information from the Credential Manager application in secure folders called

Computers and Technology
1 answer:
Delicious77 [7]3 years ago
8 0

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
You might be interested in
Which one of the following statements most fully describes the general capabilities of desktop publishing software?
OleMash [197]
The answer is B.
<span> desktop publishing program must be able to take text and graphics from a number of sources and allow these elements to be arranged on a page. 
The main purpose of a destkop publishing program is to aid user in creating documents using its page layout so it could generate printable media with higher quality compared to the one that is handmade.</span>
7 0
3 years ago
Which of the following processes should Angel use to merge cells A1:D4 to create a title?
podryga [215]

Answer:

Highlight cells A1:D4, right-click and select Format Cells, click Alignment, and choose the Merge cells option.

Explanation:

We merge cells with the help of following methods.

<u>Method 1  </u>

  1. Highlight cells A1:D4
  2. click on the Home tab
  3. click on the <u>Merge and Center</u> icon in the Alignment group

1st method is not given in options of question.

<u>Method 2</u>

  1. Highlight cells A1:D4
  2. right-click and select Format Cells
  3. click Alignment
  4. choose the Merge cells option

<em>2nd method is matching with </em><em><u>option D. </u></em><em>So, Option D is the answer.</em>

<u />

6 0
3 years ago
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
Read 2 more answers
Qual foi o primeiro computador no mundo a ser criado e qual é a hitória por trás?
Bess [88]

Answer:

Espero que isso ajude você!

Explanation:

O ENIAC foi inventado por J. Presper Eckert e John Mauchly na Universidade da Pensilvânia e começou a construção em 1943 e só foi concluído em 1946. Ocupava cerca de 1.800 pés quadrados e usava cerca de 18.000 tubos de vácuo, pesando quase 50 toneladas.

4 0
3 years ago
What is gained by increasing the rotation speed of a disk or cd?​
Liula [17]
It increases transfer rate and decreases average access time.
3 0
3 years ago
Other questions:
  • In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message
    10·1 answer
  • ____ contain instructions for the OS for hardware devices, such as the keyboard, mouse, and video card, and are stored in the sy
    15·1 answer
  • You created the following dictionary relationships = {'Jimmy':'brother', 'Carol':'sister'}. You then executed the following code
    5·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • Explain 3 categories of plagiarism​
    14·2 answers
  • Find out the names of at least 20 programming languages and their developers.
    12·2 answers
  • Lesson 2.7 Code Practice #2
    13·1 answer
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
  • Project stem test 3 answers
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!