1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
14

A Windows Live ID is used to

Computers and Technology
1 answer:
Inessa [10]3 years ago
3 0

e-mail a presentation.

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?
pishuonlain [190]

The section of a PCM that is responsible for sending the proper reference voltage to many of the sensors is the input sensor section.

<h3>What are PCM inputs?</h3>

The Powertrain Control Module (PCM) is known to be an input section of the PCM.

It is made up of the engine's ignition system, fuel injection system and also emission controls. The PCM is known to receives inputs a lot from different kinds  of sensors and switches.

Learn more about sensors from

brainly.com/question/26320121

8 0
3 years ago
What does an Office employee use a computer for??
Neko [114]

Answer:

Work?

Explanation:

6 0
3 years ago
Es el nombre que se le da a la<br> intersección de una columna y fila:
BARSIC [14]

Answer:

en ingles es cell

Explanation:

3 0
3 years ago
A computer scientist creates a necklace to celebrate the birth of her daughter. The necklace encodes her daughter's
Vesna [10]

Answer:

26

Explanation:

I just know it ok; rjkhshwnwjk

5 0
4 years ago
Other questions:
  • Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
    13·1 answer
  • Which company has experienced censorship in China?
    13·2 answers
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • Systems thinking includes consideration of all of the following EXCEPT
    9·1 answer
  • Within a table, the intersection of a row and a column creates a(n) ____.
    13·1 answer
  • Week 3 Discussion Requirements Modeling Requirements modeling is one of the earlier phases of software development where require
    7·2 answers
  • How are some businesses capitalizing on social media at the time of someones death
    7·1 answer
  • PLEASE HURRY!!!!!!!!!! WILL MARK BRAINLIEST!!
    13·1 answer
  • List three social implications of the wider range of piracy​
    15·1 answer
  • Which of the following bit value represent -5 in two's complement notation?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!