1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
5

A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate

the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information
Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
7 0

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

RUDIKE [14]3 years ago
3 0

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.

You might be interested in
What are general purpose computer and special purpose computer?​
icang [17]

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

3 0
3 years ago
Read 2 more answers
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
You have been employed as a technical consultant to a computer shop chain. You are given the task of creating a short consumer b
brilliants [131]

Answer:

The five factors to consider when trying to choose between a Solid State Drive, a Hard Disk Drive and, an External Hard Disk Drive are:

  1. Read/Write Speed
  2. Weight
  3. Power Consumption
  4. Cost
  5. Storage Capacity

  • Solid State Drives (SSDs) are typically lighter in weight, faster and do not consume much power.
  • Hard Disk Drives are relatively cheaper than SSDs. They also come with higher storage capacities but are more power-hungry and slower because they rely on mechanical/moving parts to read and write data.
  • External HDDs are the cheapest of the three. They are not internal which is a major drawback given the additional weight. However, they come with gargantuan storage capacities that make you want to rethink having one. Besides, unlike SSDs, you can easily get them in computer accessories shops offline or online.

Cheers!

3 0
3 years ago
George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
Alex777 [14]

Answer:

data source

Explanation:

The main aim of a data source is for the gathering of all necessary information that is needed to access a data. Since he has used the information to create a pie chart, this means that some data were used for the creation of this pie chart. Hence the information used for the creation of the pie chart is the data source for the information illustrated on the pie chart.

3 0
3 years ago
An online conference room reservation system lets a user reserve rooms. The user is required to enter contact information and re
lisov135 [29]

Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail

Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .

The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.

These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).

Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.

7 0
3 years ago
Other questions:
  • If you think the user might enter 24.9, you should create a float variable. true or false
    9·1 answer
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • Hello, please help write code in C++. Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go nort
    12·1 answer
  • The Curiosity Rover has recently landed on Mars and likes to send Twitter updates on its progress. If a tweet is posted 10 minut
    6·1 answer
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
  • What do u mean by generation of computer
    10·1 answer
  • Write a program to simulate a Fruit Machine that displays three symbols at random from Cherry, Bell, Lemon, Orange, Star, Skull.
    11·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • Jade has to create a workbook for storing information of students participating in the annual state-level sports competition. Th
    5·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!