1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
4 years ago
12

Which tool relies on the logged on user's certificate details to encrypt or decrypt files and folders? powershell bitlocker encr

ypting file system (efs) trusted platform module (tpm)?
Computers and Technology
1 answer:
grigory [225]4 years ago
3 0
The tool relies on the logged on user's certificate details to encrypt or decrypt files and folders is the encrypting file system (efs).
It gives filesystem-level encryption as part of the improvement made on Microsoft Windows in version 3.0 of NTFS. This technology allows files to be visibly encrypted to secure confidential data from unsecured access to the computer. 
You might be interested in
with the aid of your own example explain how memory,registers and secondary storage all work together​
AnnyKZ [126]

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

<h3>How does memories works together?</h3>

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

brainly.com/question/25040884

6 0
2 years ago
Draw directed graphs representing relations of the following types.
mixas84 [53]

Answer:

The first graph in the picture describes a relation that is (a) Reflexive, transitive, and anti-symmetric.

Because a, b, c, d all are related to itself, so reflexive.

where (a, b) and (b, d) are in the relation, (a,d) is in the relation,    

for (c,a) and (a,b) there is (c,b).

so it's transitive.

for all a,b in the relation, (a,b) there is no (b,a) with a ≠b.

The second graph in the picture describes a relation that is (b) Reflexive, transitive, and neither symmetric nor anti-symmetric.

Because a, b, c, d all are related to itself, so reflexive.

where (a, b) and (b, a) are in the relation, (a,a) is in the relation,                                                    

where (c, d) and (d, d) are in the relation, (c,d) is in the relation,                                                    

so it's transitive.

Because, (a,b) and (b.a) are there, but for (c,d) there is no (d,c) in relation.

So, the relation is not symmetric.

(a,b) and (b,a) is in relation but, a≠b, so not anti symmetric.

Explanation:

For all a in a set,  if (a,a) in a relation then the relation is reflexive.

For all (a,b) in relation R, if (b,a) is also in R, then R is symmetric.

For all (a,b), (b,c) in relation R, if (a,c) is also in R, then R is transitive.

For all (a,b), (b,a) in R, a = b,  then R is an anti- symmetric relation.

3 0
3 years ago
A navigation device that transfers packets of data between two or more networks is called a _______
Ira Lisetskai [31]
<span>A navigation device that transfers packets of data between two or more networks is called a Router.</span>
5 0
4 years ago
Kathi, the owner of Klothes for Kats, is excited about the launch of her first Local Catalog ad. She remembers there are a few d
mina [271]

Answer:

Map view

Explanation:

The view that will most likely be displayed would be a Map view, where potential customers can see the Klothes for Kats logo, store information, and in-stock products. This is because Local Catalog ads only have a small space that is used to promote what is being advertised. Therefore, in these small spaces the most important things need to be shown in order to attract as many people as possible with what the store offers. The ad needs to have the logo and store information so that the potential customers can easily know what store is being advertised on the ad. The ad also needs to show some of the popular in-stock products in order to attract individuals that are actually interested in the products that the store is trying to sell.

6 0
3 years ago
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • To move one screen to the left press ____.
    9·1 answer
  • What are the three modes of the 3D transform manipulator
    12·1 answer
  • The Internet of Things (IoT) is a global information architecture that could contain
    12·1 answer
  • To all paladins players out there!!!!!
    14·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • How many syllables does snail have
    12·1 answer
  • Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
    12·1 answer
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!