1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
12

I have been trying for 2 days to make an account, but it says registration cannot be completed at this time. It is extremely ann

oying because I need help with some math problems but it will not allow me to view answers without an account. I have tried a couple different browsers and i've tried multiple times. If anyone knows how to help it would be appreciated. Thx! :)
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
6 0

Answer: Ok what kind account are you trying to make if you need a account i can make one for you here is my hangout email . So i can give you the info to the account i made for you.

antoniya [11.8K]3 years ago
5 0

Answer: maybe change age I feel sobao but comment your question and I could help

Explanation:

You might be interested in
Can any software run on any processor
jekas [21]

Answer:

Yes.

Explanation:

Your software requires CPU instruction if CPU doesn't provide that instructions the software won't work/run.

hope this helps you

have a great day:)

6 0
3 years ago
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
3 years ago
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
To deny traffic destined to a specific tcp port you will need to apply a __________ access control list.
Fiesta28 [93]
The correct answer for the fill-in-the-blank is [user]3
4 0
4 years ago
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
3 years ago
Other questions:
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • Who is involved in helping shape the emotional impact of a film? (Select all that apply.)
    8·2 answers
  • An associate is seeking advice on which device to purchase for a friend who is a business owner. The friend needs the ability to
    13·1 answer
  • Guys i really need help pleasure?
    7·2 answers
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • By recording where a hockey puck goes into a net, a goalie can...
    8·2 answers
  • PHP server scripts are surrounded by delimiters, which? *
    5·1 answer
  • What menu and grouping commands is the "SORT" tool? ( please answering meeeee)
    9·1 answer
  • Write. true or false​
    5·2 answers
  • Which one of the following does NOT contain a
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!