1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
12

When you enforce restrictions, what must you do immediately?

Computers and Technology
2 answers:
Minchanka [31]3 years ago
5 0
The first one , create a password
sweet [91]3 years ago
4 0
The answer is A create a password
You might be interested in
"In about 100 words, discuss the technologies that Walmart’s trucking fleet might use to better manage their operations. Include
Sergio [31]

Answer:

The answer to this question can be described as follows:

Explanation:

The term Tracking technology is divided into two parts first tacking and technology, in which Tracking is being used to increase or decrease the frequency of both the document on one page by increasing or growing the distance among letters, and technology is how we use engineering for intensive purposes.

  • The technology of tracking It is very the fusion of many innovations, that can also be combined to build machines, which follow the material, stock or even the fleets of vehicles. A delivery of situation-based services to wireless networks can be achieved by similar programs.
  • The principal aim is to look at individuals or items on the movement and to provide for the further analysis a timely ordered locational sequence of details.
3 0
3 years ago
TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
kodGreya [7K]

Answer:

2. SSL can interact with its earlier versions which is a vulnerability

Explanation:

TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are both used for providing data authentication and encryption between networking devices  (such as servers, PCs and applications) operating over a network. The iterations of SSL were versions 1.0, 2.0 and 3.0. But then, all these iterations had security issues and so TLS 1.0 was released to improve on those security flaws. And seeing that SSL can interact with its earlier versions which are all vulnerable, downgrading TLS to SSL for compatibility sake will abuse the essence of TLS in the first place.

6 0
3 years ago
In the sentence below, identify the proofreader's marks used.<br><br>Check my answer please :)
Ulleksa [173]
The answer is (A) Close up or Close space


Basically, the best way to learn proofreading marks is to constantly use them and to try and memorize them. In the example above, the marks are categorized as those for inserting, deleting and changing text. In this case the marks represent delete character and close up. The numbers after correction would be (333-1122)
3 0
3 years ago
After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
pashok25 [27]

Answer:

configuring the software

Explanation:

Alexandre is said to have installed a new software to her computer and then proceeds to set it up to perform in a certain way. What she did was to configure the software.

Configuring software in a computer has to do with setting it up to behave in certain ways according to the user.

3 0
3 years ago
The next thing Maia wants to do is to indent the first line of her paragraphs.
mr_godi [17]

Answer:

she can indent the first line of her paragraph by clicking on the space bar a series of time.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which remote assistance option requires peer name resolution protocol (pnr) and ipv6?
    5·1 answer
  • You may see the term FAQ on websites which stands for Frequently Asked Questions this is an example of which type of mnemonic?
    9·1 answer
  • Assume the list numbers1 has 100 elements, and numbers2 is an empty list. Write code that copies the values in numbers1 to numbe
    15·1 answer
  • A computer is an electronic device operating under the control of instructions stored in its own memory that can accept, manipul
    11·1 answer
  • Which feature of a presentation program’s interface provides a list of commands to create, format, and edit presentations?
    14·2 answers
  • You and your project team have been asked to generate a solution to a problem. The problem is not complicated, and you are sure
    6·1 answer
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
  • Any websites online to make $50 daily?​
    11·1 answer
  • You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue.
    14·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!