1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
12

central, secure database in which Windows stores hardware and software configuration information and system security policies is

______________________. This includes information about device drivers, setup programs, hardware profiles and user profiles.
Computers and Technology
1 answer:
Ilya [14]3 years ago
8 0

Answer:

The Registry

Explanation:

The registry is a centralized and secure database whereby Windows stores the overall configuration information of the hardware including the configuration information of the software as well as the system security policies. The Components that make use of the registry include the device drivers, Windows kernel, hardware profiles, setup programs, and user profiles.

You might be interested in
Which device is used to direct the flow of data on a computer network?
alexgriva [62]

Answer: router

Explanation:

a router directs flow of information

3 0
1 year ago
What is the best kernel synchronization solution on multicore systems when a lock is held for brief periods ?
Delvig [45]

Answer: C) spin-lock with test and set

Explanation:

In spinlock, when a thread locks a spinlock then it continuously retrying locking until it succeeds. Spinlock is the lock that cause thread and continuously check that whether the lock are available or not for synchronization.

So that is why spinlock is best synchronization solution as it is not allowing any another thread.

On the other hand, in mutex thread try to lock a mutex and then, it automatically go to sleep mode before locking and immediate allow another thread to run.

8 0
2 years ago
If an M/M/1 queue in a server has task arrivals at a rate of 30 per second and serves at a rate of 50 per second, how many tasks
Scorpion4ik [409]

The answer & explanation for this question is given in the attachment below.

6 0
3 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
2 years ago
The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
jekas [21]
The code of five digits is of the form:

A B C D F

Where A (the first digit)  may be any of 9 digits (because 0 is excluded)

B, C, and D, may be each any of 10 digits (0 - 9)


F (the last digit) may be 0, 2, 4, 6 or 8, i.e. 5 different digits.


So the number of different available codes is:

9 * 10 * 10 * 10 * 5 = 45,000.


Answer: 45,000
4 0
2 years ago
Other questions:
  • By applying styles formats are being applied ?
    14·2 answers
  • If you need to show slides on a wide-screen monitor, you might change their size to: Select one: a. Onscreen Show (16:9) b. Onsc
    11·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • What do the buttons on the paste options menu do
    11·1 answer
  • Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The follow
    7·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • Help please
    13·2 answers
  • A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a un
    8·1 answer
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!