1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
15

A source is:

Computers and Technology
2 answers:
Anestetic [448]3 years ago
4 0

Answer:

A. a primary work from which information is taken.

Explanation:

barxatty [35]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
Misha Larkins [42]

Answer:

4GLte

Explanation:

8 0
3 years ago
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, w
enot [183]

Answer: The user had a mandatory profile.

Explanation:

A user profile is considered mandatory and such profile is known as pre-configured roaming user profile that only administrators can use to make precise settings for clients. In this type of profile, one can adjust his or her desktop settings, the adjustment are temporarily stored after logging off from the profile.

8 0
4 years ago
If a tire fails or you have a blowout you should immediately concentrate your attention on
Orlov [11]

Stopping the car. Do not continue driving if your tire has failed or blown out. After you stop the car, call for roadside assistance. Remember, safety first when you're driving!

7 0
3 years ago
Read 2 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ...,
    13·1 answer
  • The number of bits per pixel is called what
    7·1 answer
  • Number 20, can anyone help?
    11·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Identify the correct sequence of steps to change the font from Verdana to Arial.
    10·1 answer
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • Va rog urgent
    8·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!