1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
10

2. ¿Cuáles de los siguientes Software son lenguajes de Programación?

Computers and Technology
1 answer:
poizon [28]3 years ago
6 0

B) C# Java y Visual Basic

You might be interested in
In the CIA Triad, "Confidentiality" means ensuring that data is
Fiesta28 [93]

Answer:

In the CIA Triad, "Confidentiality" means ensuring that data is

Explanation:

protected from unauthorized changes to ensure that it is reliable and correct.

7 0
4 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
How can social media be used to find out about activities?
ICE Princess25 [194]
Hello RandomHacker


Using social media can inform you when events are happening near by. 

For example: Your favorite singer of band is going on tour and they are doing it near you, social media advertises this and you can find out in time to go.

Hope this helps
-Chris

3 0
3 years ago
Read 2 more answers
The ____ is a new feature in versions of microsoft office, starting with office 2007; it consists of tabs, which contain groups
lions [1.4K]
Excel i think that's correct
5 0
4 years ago
What is the name used for the camera’s view from a single position?
netineya [11]
A.A shot. 
hope this helps!!
5 0
3 years ago
Other questions:
  • What computer would be good for editing and streaming for less than 600$?
    7·1 answer
  • What are language standards? At this point in your study of programming, what do they mean to
    5·1 answer
  • In order to delete an object, it must be?
    14·1 answer
  • 1. _____ can’t be rewritten by the computer in which it’s installed, but it has the advantage of being very _____.
    6·1 answer
  • Write a function that, given an array of integers and its size, reverses the elements in the array. For example, if the original
    13·1 answer
  • Servlet session and JSP session have differentabilities.<br>? True<br><br>? False
    15·1 answer
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    13·1 answer
  • Which data type is –7?<br><br> int<br><br> single<br><br> string<br><br> float
    15·1 answer
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
  • Who is the owner of apple company??​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!