1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
6

According to which virtue do you need to secure information by limiting computer access to authorized personnel only?

Computers and Technology
1 answer:
stealth61 [152]3 years ago
7 0

The answer is A : 256 or 2 to the 8th power different combinations.  In EBCDIC (Extended Binary Coded Decimal Interchange Code).  It is an 8-bit code allowing 256 possible combinations of textual symbols.  (2 to the 8th power = 256)

You might be interested in
I need help I would really appreciate it
Andreas93 [3]

Answer:

Checks if it is a multiple of 3 and 5

Explanation:

Its an if statement using modulus division to check for a remainder. It checks if a number is a multiple of 3 AND 5. (&& and & both mean and in Java).

If the remainder of both is 0 then that means the mystery number is a multiple of both 3 and 5.

3 0
3 years ago
• R7.9 Write enhanced for loops for the following tasks.
alexdok [17]

Answer:

a is the correct answer

Explanation:

correct me if I'm wrong hope it's help thanks

3 0
3 years ago
Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
djverab [1.8K]

Answer:

E. Transaction processing system

Explanation:

Explanation: He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order. Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.

8 0
3 years ago
Which of the following is a challenge-response authentication protocol intended to provide security at every level (sign-in, acc
Mashutka [201]

Answer:

New Technology LAN Manager (NTLM)

Explanation:

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password.

NT LAN Manager was the default protocol for Windows until Microsoft deprecated it, citing vulnerabilities related to the password hash’s password equivalency. Passwords stored on the server, or domain controller, are not salted and therefore an adversary with a password hash does not require the underlying password to authenticate. NTLM’s cryptography also predates newer <em>algorithms</em> such as <em>AES or SHA-256</em> and is susceptible to brute force attacks by today’s hardware.

5 0
4 years ago
Read 2 more answers
Jamie takes part in a quiz competition. she is asked to name the total number of combinations that the bits 1 and 0 will have in
dalvyx [7]
The answer is A 

I hope this help
6 0
3 years ago
Read 2 more answers
Other questions:
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • What is the output of the following code? public class Test { public static void main(String[] args) { int list[] = {1, 2, 3, 4,
    14·1 answer
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • You can change the location of the layers panel on the screen by _____ .
    7·1 answer
  • How to change default search engine in internet explorer 11?
    13·1 answer
  • _____ is a computing model in which an organization outsources the equipment used to support its business operations, including
    15·1 answer
  • Why do organizations create multiple databases?
    12·1 answer
  • Because filling a pool/pond with water requires much more water than normal usage, your local city charges a special rate of $0.
    14·1 answer
  • Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!