1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
4 years ago
12

In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:

Computers and Technology
2 answers:
cricket20 [7]4 years ago
5 0

Answer:

Your computer must be TPM compatible

Explanation:

TPM -> Trusted Platform Module.

For BitLocker’s to have its full-disk encryption on any computer, the computer be TPM compatible.

This TPM creates the original encryption keys of the BitLocker, after which the keys are then saved/stored; that's why the BitLocker needs the TPM to function.

On it's own, it can unlock the computer's drive for the user to login to the system by just typing the login pass phrase.

When you try using BitLocker on a computer without TPM, you'll receive a notification that says your administrator must set a system policy option.

zhenek [66]4 years ago
4 0
70% C, 20% B, 5% / 5% - A /B
You might be interested in
1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
Luda [366]

Answer:

Hi there Kaylee! The answers to the blanks are as follow:

1.The character escape sequence to force the cursor to go to the next line is \n

2. The character escape sequence to force the cursor to advance forward to the next tab setting is \t  

3.The character escape sequence to represent a single quote \'

4.The character escape sequence to represent a double quote is \"

5.The character escape sequence to represent a backslash is \\

Explanation:

Character escape sequences are used for processing of special characters that may otherwise be used in a context where those characters are reserved as keywords or carry other symbolic reference. If these are not escaped, the output will not be correct.  

6 0
3 years ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
Peter’s Father wants to buy a new computer for his office use on word processing tasks. He wants to bring his computer to and fr
8_murik_8 [283]
A good option for Peter's father's computer needs would be a laptop or a notebook.  It is handy so he can bring it to and from the office.  It is also has the specifications needed for his word processing tasks as long as he installs a work processing software.
3 0
3 years ago
Read 2 more answers
State two ways of preventing virus attack on a computer.​
Goshia [24]

Answer:

updating the computer and having an anti virus on your computer

5 0
3 years ago
Firewalls are categorized into two; namely hardware firewall and software firewall. Identify the correct statement for a softwar
garri49 [273]

Answer:

Option (d) Software firewall is placed between the normal application and the networking components of the operating system

Explanation:

  • Software Firewalls protect the computer from trojans and malicious content which can arise from unsafe applications.
  • It also protect the computer from external network.
  • It filters the data to and from a software application in the desktop.
  • It also filters the data to and from a network.
  • It safeguards the computer from not loosing access to the attackers.
  • It is customizable software and has to be monitored like installing updates and storage spaces etc.
  • Software Firewall in conjunction with the Hardware Firewall must be used for the security of the desktop and the networks.
5 0
3 years ago
Other questions:
  • Which of the following is not true about managing your privacy settings? (select all that apply)
    9·2 answers
  • Add the number <br><br> 10010110+10111101
    12·2 answers
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • Justify the need for branching and jump codes in the instruction set using real world scenarios
    6·1 answer
  • Need to know? Anyone feel like helping me not fail
    13·1 answer
  • How should I represent myself online? ​
    7·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
  • What are the cloud storage components
    6·1 answer
  • What is Smart Content Profits all about?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!