1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
12

central, secure database in which Windows stores hardware and software configuration information and system security policies is

______________________. This includes information about device drivers, setup programs, hardware profiles and user profiles.
Computers and Technology
1 answer:
Ilya [14]3 years ago
8 0

Answer:

The Registry

Explanation:

The registry is a centralized and secure database whereby Windows stores the overall configuration information of the hardware including the configuration information of the software as well as the system security policies. The Components that make use of the registry include the device drivers, Windows kernel, hardware profiles, setup programs, and user profiles.

You might be interested in
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Which of the file names below follows standard file naming convention?
Alexxandr [17]

The answer is B: BUS-APP_QUZ_CH02_V01

A file naming convention is a method for naming files in a systematic way. Naming files consistently and in a logical way will facilitate storage and retrieval of data. There are various standard naming conventions that should be followed. One is to always use capital letters to delimit words. Do no use  spaces and try not to make the file names too long. Most operating systems will recognize underscores and dashes and not recognize special characters such as / ! @ # $ % so avoid them. Names should also not be separated and thus, only option B meets the above criteria.  

4 0
3 years ago
Read 2 more answers
Select the correct answer,
bazaltina [42]

Answer:

b gyhffhhhgghhhhhhhhhhh

3 0
4 years ago
Which process is based on repulsion of oil and water?
Tasya [4]
E.........................
4 0
3 years ago
_____ is a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that
lutik1710 [3]

Answer: Social media

Explanation:

 Social media is defined as the group of the internet based various applications that basically build on the foundation of  technological and ideological of the web 2.0. It basically allow the exchange of the user content and creation.

It is the most flexible platform that enable the users with the huge experience. It is also known as free and open source platform. It basically contain the various content that are algorithm driven and machine learning.

 

3 0
3 years ago
Other questions:
  • Which three phrases describe a wireframe
    12·1 answer
  • How do i change my Email in brainly ? ​
    7·2 answers
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time. true false
    15·2 answers
  • Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0
    6·1 answer
  • TRUE OR FALSE!!! <br> Your location can be tracked via your digital footprint.
    9·1 answer
  • The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
    6·2 answers
  • A __________ note is a private note that you leave for yourself or for other people who might use the presentation file
    9·1 answer
  • Question 2 (6 points)
    11·1 answer
  • When a cpu executes instructions as it converts input into output, it does so with _____.
    8·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!