1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
15

Situation 1: Mang Castor wanted to create a simple nutcracker Christmas tree

Computers and Technology
1 answer:
Papessa [141]3 years ago
6 0

56856546856754578247

You might be interested in
(I'm sorry that this question isn't school related, I can't find answers anywhere else)
Juliette [100K]
Because you have to explain how you got it
3 0
3 years ago
How can you specify a page has the highest priority?
coldgirl [10]

Answer:

1.0

Explanation:

Priority Tag is to be mentioned in Sitemaps

Various priority values range from 0.1 to 1.0. The highest priority page has the priority value = 1.0, and the lowest priority page has a value of 0.0, and the priority value varies with the priority of the page. And these values are assigned to the priority tag in the sitemap. The sitemap, in fact, is the XML file through which we can set the priority of a webpage.  

8 0
4 years ago
Explain how the internet works​
yulyashka [42]

How does the Internet Work?

The Internet works through a packet routing network in accordance with the Internet Protocol (IP), the Transport Control Protocol (TCP) and other protocols.

Hope this helps you!

5 0
3 years ago
Read 2 more answers
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
A computer understand..............codes.<br>​
KiRa [710]

Answer:Computers only understand machine code - they do not understand high-level language code. Any high-level programming language code has to be converted to executable code. Executable code is also known as machine code which is a combination of binary code 0s and 1s.

Explanation:

6 0
3 years ago
Other questions:
  • A(n) ____ loop executes a predetermined number of times.
    12·1 answer
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • A self-confident person knows that:
    13·1 answer
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • At an open or uncontrolled intersection, yield if ____.
    15·2 answers
  • How to do this button ?
    14·1 answer
  • Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second lin
    12·1 answer
  • Select the correct answer.
    13·1 answer
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!