1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
8

PLEASE HELP ME WITH THIS QUESTION:

Computers and Technology
1 answer:
Darina [25.2K]3 years ago
5 0
There’s literally no question here
You might be interested in
To add a picture file to a PowerPoint slide, a usor should first go to the
Murrr4er [49]

How to embed images in Powerpoint?

Click on the Pictures button to open the file browser. Now, browse to where your images are stored and click on them in the file browser. Choose Insert > Pictures on PowerPoint's ribbon, then browse to and choose the images you want to insert. Click on Insert to add them to your current slide

6 0
3 years ago
What is difference between local method invocation and remote method invocation?
Vlad [161]

Answer:

 Local method invocation parameters are passed by reference with the same object. Local innovation having the source code on the form of class and it basically try to invoke various methods by importing in the form of packages.

On the other hand, in remote methods invocation the parameters are passed by the copy when the given parameters are not object class. It basically allow an object that existed in another address capacity. This methods works on the client side transport.

8 0
3 years ago
Lance is at a bus station. his friend is using the atm machine to withdraw some money. lance notices a stranger deceptively watc
stich3 [128]

The person watching Lances friend typing the ATM pin is an example of shoulder browsing. Lances friend should change the ATM pin.

<h3>What does ATM mean?</h3>

This is known as automated teller machine. It is said to be a kind of unique computer that makes it easy to manage a bank account holder's money.

Based on the above, The person watching Lances friend typing the ATM pin is an example of shoulder browsing. Lances friend should change the ATM pin so that his funds will not be stolen.

Learn more about ATM from

brainly.com/question/12629434

#SPJ4

4 0
3 years ago
Read 2 more answers
Which type of password would be considered secure
ElenaW [278]
Most secure passwords contain a variation of; Uppercase letters, lowercase letters, numbers, and symbols.

Hope this helped!
8 0
3 years ago
Read 2 more answers
What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
Katarina [22]

SID filtering enables to control of the sid history attribute from being utilized to falsely gain administrative privileges in a trusting forest.

<h3>What is  SID filtering?</h3>

SID filtering renders the domain controllers (DCs) in a trusting domain to remove all SIDs that aren't members of the trusted domain. In other words, if a user in a trusted domain exists as a member of groups in other domains in the forest, the trusting domain will withdraw those groups' SIDs from the user's access token.

For a newly set up trust between two domains or two forests, the SID Filtering exists activated by default. The filter extracts all foreign SIDs from the user's Access Token while accessing a resource through trust in a trusting domain.

SID filtering enables to control of the sidhistory attribute from being utilized to falsely gain administrative privileges in a trusting forest.

To learn more about SID filtering refer to:

brainly.com/question/23814085

#SPJ4

3 0
2 years ago
Other questions:
  • 1.an electronic index of books A. web page
    12·1 answer
  • How many different Microsoft Windows file types can be infected with a virus?
    10·1 answer
  • Before installing any software, it's always important to back up your system and to create a BLANK, which enables you to go back
    6·2 answers
  • NEED HELP AGAIN
    11·2 answers
  • In an image citation, what piece of information is listed first?
    14·1 answer
  • How are codecs related to audio file formats?
    9·1 answer
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • Who Has any idea How to code?
    7·2 answers
  • The theory of plate tectonics evolved from previous theories and concepts put forward by several scientists before its conceptio
    15·2 answers
  • Who is your favorite XC2 character, and why?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!