1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
12

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative

identity?
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
5 0

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

You might be interested in
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
vichka [17]

Answer:

Ping

Explanation:

If working in an environment that uses Linux and Windows servers and the network using IP protocol, if an application you are using is unable to to connect to a windows server named FileSrv2, you will need to test network connectivity between your workstation and the server by using either the "ping" or "traceroute" command.

3 0
3 years ago
2. Input a decimal number and test if it is not equal to 16.5.
lubasha [3.4K]

Answer:

2:

decNum = float(input("Decimal number: "))

if decNum != 16.5:

   print("Does not equal")

elif decNum == 16.5:

   print("Equal")

else:

   pass

3:

if x > 57:

   x += 4

   print(x)

4:

numOne = int(input("Enter number: "))

numTwo = int(input("Enter number: "))

if numOne < 100 and numTwo < 100:

   yes = numOne + numTwo

   print(yes // 2)

else:

   pass

Explanation:

Please give me brainliest.

6 0
2 years ago
Write a Java program in jGRASP that creates a 2D integer array of 5 rows and 20 columns, fills it with increasing integer values
Alex73 [517]

Answer:

As per the question we need to make 5 rowa and 2o columns, in this we have total element 100 so range should be 0 to 99, but we are suggested to keep range 0 to 59, so i have kept the elementns in the range, but if it was a typo in the question for range you do not need to reset the k with zero.

Explanation:

//create a new class  TestArray

public class TestArray {

//define main method

public static void main(String[] args) {

 //declare a 2D array of given size i.e. 5 rows and 20 columns

 int arr[][] = new int[5][20];

 //declare an integer variable k and initialize it with zero, this will used to initialize the array from 0 to 99

 int k = 0;

 //for loop for rows

 for (int i = 0; i < 5; i++) {

  //for loop for columns

  for (int j = 0; j < 20; j++) {

   //initialize arr with the current value of k

   arr[i][j] = k;

   //once k is 59 set it zero again as we are not going beyond 59

   if(k == 59)

    k = 0;

   //increment value of k with 1

   k++;

  }

 }

 //print the element from the array one by one

 //for loop for rows

 for (int i = 0; i < 5; i++) {

  //for loop for columns

  for (int j = 0; j < 20; j++) {

   //print the current element of array and an space with it

   System.out.print(arr[i][j]+" ");

  }

  // move the cursor to new line

  System.out.println();

 }

}

}

7 0
4 years ago
Which option is not a tab type? center tab right tab hanging tab left tab
Gala2k [10]

Answer: C

Explanation:

6 0
3 years ago
Read 2 more answers
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
Other questions:
  • What are the methods or permissions needed to view the passwords for linux and unix?
    15·1 answer
  • Which is a example of fixed expense <br><br> -food<br> -clothing<br> -entertainment<br> -rent
    15·2 answers
  • Frances is rearranging her furniture. (1) Also, she is moving the heavy oak bookcase to the back bedroom. (2) She has decided to
    7·2 answers
  • What programming languages should a mathematician learn?
    6·1 answer
  • A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega
    7·1 answer
  • PLEASE HELP ON TECHNOLOGY
    8·1 answer
  • Need help with these
    8·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • Convert the following denary numbers into
    14·1 answer
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!