1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
14

________ is a process where authentication and permission will be passed on from one system to another, usually across multiple

enterprises, reducing the number of authentications needed by the user.
Computers and Technology
1 answer:
hoa [83]3 years ago
3 0

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

You might be interested in
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
Which of the following is not included in the manufacturing industry cluster?
max2010maxim [7]
Printing is not included in the manufacturing industry cluster
6 0
3 years ago
Read 2 more answers
After a customer buys a computer or receives service from Top Computers and Service, a service representative contacts each cust
AlladinOne [14]

Answer: False

Explanation:

 The given statement is false, as the survey information basically represent feedback in which the service representative contact each and every customers to collect the feedback.

Feedback is in the form of information in which it represent the reaction in the scenario to the output but it basically affects as an input. Therefore, the survey information is in the form of input not as output.

7 0
3 years ago
Select all that apply) Alex is designing a webpage for her composition course that summarizes her research project. As she prepa
marissa [1.9K]

Answer:

C. Purpose

Explanation:

The purpose of website should be determined and then text fonts and layout should be selected. The target audience of the website should be determined and it should be identified their preference so that website layout is designed in a way which impresses the audience and leaves an impact on them.

6 0
3 years ago
A development team begins work on a new software application and decides to involve the client’s it experts to ensure that secur
Katarina [22]

Application Security is responsible for securing the software.

Application security refers to the process of creating, integrating, and testing security measures inside of applications to close security vulnerabilities to threats including unauthorised access and modification.

Application security is a technique for making apps more secure by identifying, addressing, and enhancing the security of apps.

While much of this occurs during the development phase, it also includes tools and approaches to protect apps after they are launched.

A method for identifying a device's vulnerabilities and confirming that its sources and data are protected from potential intruders is security testing.

It ensures that the application and software are safe from any dangers or hazards that could cause a loss.

Learn more about application security:

brainly.com/question/28020583

#SPJ4

The complete question is ''A Development team begins work on a new software application and decides to

involve the client's IT experts to ensure that security concerns are addressed on

an ongoing basis throughout the project's lifecycle.

Which security capability is responsible for securing the software?

O Application Security

O Identity and Access Management

O Security Operations

O Risk Management

O I don't know this yet.

7 0
1 year ago
Other questions:
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • Which of the actions below will not create more room on your hard drive?
    11·1 answer
  • A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
    10·1 answer
  • which one of the following word process feature saves you the most time when you keying in a document
    9·1 answer
  • a limited-access expressway. A)allows vehicles to enter or exit only at certain place.B) does not permit trucks or buses.C)has n
    9·1 answer
  • What type of account provides the same functions as managed service accounts but can be managed across multiple servers as in a
    8·1 answer
  • Pls tell me the answer pls i need the answer
    6·2 answers
  • ¿Cuál es la función que cumplía los sofistas y Porque eran tan importantes?​
    13·1 answer
  • Please complete the spelling please tell fast.​
    11·2 answers
  • How can you have internet without subscribing to cable?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!