1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
13

Using a pin or password in addition to tpm is an example of what type of authentication?

Computers and Technology
1 answer:
anzhelika [568]3 years ago
3 0
Considering it is private i would say security?
You might be interested in
A Ground Fault Circuit Interrupter (GFCI) works by comparing the amount of current going to and returning from equipment along t
Shtirlitz [24]

As the name states, during a ground-fault (when the current going out is significantly different than the current going in) the GCFI interupts the current.  Usually by a switch of some sort.  (Pushing the "test" button produces that click, and cuts off the current)

7 0
4 years ago
Read 2 more answers
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Properties of variable in QBASIC​
Arlecino [84]

Explanation:

assume numeric value and is represented by an alphabet or an alphabet followed by another alphabet or digit. ...

String variable : A string variable is represented by an alphabet followed by dollar ()sign.

4 0
3 years ago
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
dalvyx [7]

Answer:

The program is as follows:

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

   for i in user_values:

       if i <= upper_threshold:

           print(i,end=" ")

           

def get_user_values():

   user_values = []

   n = int(input())

   for i in range(n):

       num = int(input())

       user_values.append(num)

   

   upper_threshold = int(input())

   output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold)

get_user_values()

Explanation:

This defines the output_ints_less_than_or_equal_to_threshold method

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

This iterates through user_values

   for i in user_values:

For every item in user_values

       if i <= upper_threshold:

This prints all items less than or equal to the upper threshold

           print(i,end=" ")

           

This defines get_user_values method

def get_user_values():

This creates an empty list

   user_values = []

This gets the number of inputs

   n = int(input())

This iterates through n

   for i in range(n):

This gets input for every item of the list

       num = int(input())

This appends the input to the list

       user_values.append(num)

This gets input for upper threshold    

   upper_threshold = int(input())

This calls output_ints_less_than_or_equal_to_threshold method

   output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold)

The main begins here; This calls get_user_values method

get_user_values()

4 0
3 years ago
Help ......... pleaseeeee
Dmitrij [34]

Answer:

Follows are the solution to this question:

Explanation:

Transport layer:

In the OSI model, this layer lies on the 4th part, which primary function is to directly supply the network connectivity to applications mostly on various hosts.

It provides end-to-end communication over a network and also allows you to send and receive error-free data in the form of data packets that enhanced your privacy.

Flow control and Error control:

The flow control is only used to send or receive information transmission only, while Error control is used designed for error-free communication for both (sender or receiver).

Layer related to the data link layer:

It must be done at different layers on both layers like node-to-node connections, the communicative needs are controlled by flow and error. Flow and error control in the transport layer is done from endpoint to endpoint.

4 0
3 years ago
Other questions:
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • The GeForce GTX 1060 graphics card requires 120 W of power. You plan to install it in a PCIe 3.0 ×16 slot. Will you need to also
    13·1 answer
  • While working with style formatting for a Microsoft Word document, when you change the text or paragraph formatting of a single
    13·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • When you send large attachments, you are not
    14·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    10·1 answer
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • John buy cheap stolen rims for his new truck?
    11·1 answer
  • Write any two features of Guided media​
    5·1 answer
  • Object Material: metal or non-metal? Prediction: Will the light bulb light up? Morm Observation: Does the light bulb light up? n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!