1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
12

Please help. will give u brainliest!! khan academy computers and the internet!!

Computers and Technology
1 answer:
Oxana [17]3 years ago
5 0

Answer:

a or c

Explanation:

think of which answer seems illogical.

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
2.
inn [45]

Answer:

True

Explanation:

Readability is how easy it is to read words, phrases, blocks of copy such as a book, a web page or an article. Legibility is a measure of how easy it is to distinguish one letter from another in a particular typeface.

Your welcome

5 0
3 years ago
10 points giveaway!!!!!!!!!!!!!!!!
AlekseyPX

Answer:

k

Explanation:

4 0
3 years ago
Read 2 more answers
The copy constructor for a class is called____________.
White raven [17]

Answer:

b.) when an object of the class is initialized by another object of the class

Explanation:

the copy constructor for a class is called <u>when an object of the class is initialized by another object of the class</u>

4 0
4 years ago
What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
GREYUIT [131]

Answer:

1. You want to use parameters

2. You don't want your program to run multiple times

3. You want to call that snippet of code throughout your program

hope this helped :D

5 0
3 years ago
Other questions:
  • A Hierarchy Custom Setting stores a specific URL for each profile in Salesforce. Which statement can a developer use to retrieve
    5·1 answer
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • 11.19 LAB: Max magnitude Write a function max_magnitude() with two integer input parameters that returns the largest magnitude v
    7·1 answer
  • Elaine had a problem with the computer printer she purchased. When she called the toll-free service number, she was told that sh
    7·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • Eva is listening to music while she browses the Internet. Which type of operating system must she be using?
    10·2 answers
  • Using a windows computer, to make a window wider, you would move the pointer until it changes to the horizontal resize shape and
    6·1 answer
  • Why is proper planning important?
    10·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • Make a Flow Chart From this C Programming Language Code
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!