1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
11

What kind of image does this photograph represent?

Computers and Technology
1 answer:
Juli2301 [7.4K]3 years ago
6 0

Answer:

D

Explanation:

You might be interested in
Who where the romanovs? What happened to them ?
Vikentia [17]
They where high ranking aristocrats in Russia during the 16th century. They where all executed.
5 0
3 years ago
How bridges are built over water
Black_prince [1.1K]
It’s all depending on what method
4 0
2 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
You are trying to apply the same style to several different elements in a block, with line breaks before and after. Which tag sh
alina1380 [7]

Answer:

<div>

Explanation:

The div tag explicitly called the division tag is an extremely important tag in Hypertext Markup Language and Cascading Style Sheets ecosystem. Like most of the other tags used during writing and styling web documents, the div tags plays an important role as it serves as a container which is capable of holding several HTML elements such as the head, body , paragraph tags and so on. All elements within the div tags can be easily styled using the same CSS style specification without having to take the more singular and tedious approach. They also aid fast manipulation using compatible languages. Hence, using the cajas attribute, several elements within a div can be styled at the same time. Also note that , line breaks are automatically placed before and after a tag.

Hence, the div tag is the most appropriate answer.

8 0
3 years ago
What is a good coding site
Helga [31]

Sratch.com

-Agarvated

6 0
3 years ago
Other questions:
  • How to eject a flash drive from chromebook?
    6·1 answer
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • An ironworker standing 30 feet in the air is safe wearing a full body harness that is not tied off
    15·2 answers
  • What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
    7·1 answer
  • Select the correct answer.
    13·1 answer
  • Complete the following Programming Assignment using Recursion. Use good programming style and all the concepts previously covere
    7·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • What did Adam and Eve look like?
    7·2 answers
  • Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
    11·1 answer
  • You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!