1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
4 years ago
6

A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently

forced to decrypt and encrypt the entire volume. Why did the administrator take these actions?
Computers and Technology
1 answer:
raketka [301]4 years ago
3 0

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

You might be interested in
For whom is beneficial to deduct the amount paid in state income tax from their income for purposes of computing federal income
Musya8 [376]

Obvious advantages stem from being able to deduct the full cost of state and local taxes you have to pay each year. Every deduction from taxable income helps, and these taxes can sometimes be significant. It's something of a double hit if you have to pay taxes to your state and also pay federal tax on taxes you paid to your state.

The state and local tax deduction (SALT) prevents that from happening, at least to some extent.

Rules for the SALT Deduction

All income taxes that are imposed by a state, local, or foreign jurisdiction can be deducted subject to a few rules.

First, you must itemize your deductions on Schedule A to claim them. This means foregoing the standard deduction, which is often more than the total of a taxpayer's itemized deductions for the tax year. Don't be penny wise and pound foolish and give the Internal Revenue Service more money than you have to. Make sure your total itemized deductions exceed the standard deduction for your filing status so itemizing is worth your while. Otherwise, you'll be paying taxes on more income than you have to, which was what you were trying to avoid in the first place.

The tax must be imposed on you personally. You can't claim a deduction for income taxes paid by one of your dependents—and in some cases, even by your spouse. You must have paid them during the tax year for which you're filing.  

Eligible expenses that can be deducted as state and local income taxes include:

Withholding for state and local income taxes as shown on Form W-2 or Form 1099

Estimated tax payments you made during the year

Extension tax payments you made during the year

Payments made during the year for taxes that arose in a previous year

Mandatory contributions to state benefit funds

8 0
3 years ago
Diferencia entre tipo de datos simple char y compuesto cadena​
fomenos
Man i do not speak spanish L
3 0
3 years ago
Dear Brainly, since you don't respond anyother way...
madreJ [45]

Answer:

that's an amen stop deleting our stuff deleters!.!!!!!

6 0
2 years ago
Read 2 more answers
Which feature of spreadsheet software can display numerical data in a visually appealing and easily understood format
Bad White [126]
A table maker makes visually appealing tables such as line graphs, bar graphs, venn diagrams on a spreadsheet software. 
8 0
3 years ago
Read 2 more answers
This program builds on the program developed in part
soldi70 [24.7K]

Answer:

The solution is in C++

Explanation:

// C++ programs to search a word in a 2D grid  

#include<bits/stdc++.h>  

using namespace std;  

// Rows and columns in given grid  

#define R 3  

#define C 14  

// For searching in all 8 direction  

int x[] = { -1, -1, -1, 0, 0, 1, 1, 1 };  

int y[] = { -1, 0, 1, -1, 1, -1, 0, 1 };  

// This function searches in all 8-direction from point  

// (row, col) in grid[][]  

bool search2D(char grid[R][C], int row, int col, string word)  

{  

// If first character of word doesn't match with  

// given starting point in grid.  

if (grid[row][col] != word[0])  

return false;  

int len = word.length();  

// Search word in all 8 directions starting from (row,col)  

for (int dir = 0; dir < 8; dir++)  

{  

 // Initialize starting point for current direction  

 int k, rd = row + x[dir], cd = col + y[dir];  

 // First character is already checked, match remaining  

 // characters  

 for (k = 1; k < len; k++)  

 {  

  // If out of bound break  

  if (rd >= R || rd < 0 || cd >= C || cd < 0)  

   break;  

  // If not matched, break  

  if (grid[rd][cd] != word[k])  

   break;  

  // Moving in particular direction  

  rd += x[dir], cd += y[dir];  

 }  

 // If all character matched, then value of must  

 // be equal to length of word  

 if (k == len)  

  return true;  

}  

return false;  

}  

// Searches given word in a given matrix in all 8 directions  

void patternSearch(char grid[R][C], string word)  

{  

// Consider every point as starting point and search  

// given word  

for (int row = 0; row < R; row++)  

for (int col = 0; col < C; col++)  

 if (search2D(grid, row, col, word))  

  cout << "pattern found at " << row << ", "

   << col << endl;  

}  

// Driver program  

int main()  

{  

char grid[R][C] = {"GEEKSFORGEEKS",  

    "GEEKSQUIZGEEK",  

    "IDEQAPRACTICE"

    };  

patternSearch(grid, "GEEKS");  

cout << endl;  

patternSearch(grid, "EEE");  

return 0;  

}  

8 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • How to the inverse function of f(x)=x2 +1 ,x&gt;o
    5·1 answer
  • Which osi reference model layer is responsible for transmitting information on computers connected to the same local area networ
    6·1 answer
  • What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
    6·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • If a driver who is under the age of 21 is stopped by a law enforcement officer and shown to have a BAL of .02 or greater, he or
    10·1 answer
  • Do the police check your mobile device during police checks?
    10·2 answers
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • Is brainly bugging out rn? <br> The site isnt like loading completely
    5·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!