Answer:
Answer to both the question is View Master.
Explanation:
Slide Master View is an element in PowerPoint that enables one to bring modification in slides and slide layouts in the presentation applications. From this option, one is able to edit the slide master. By modifying the slide master, every slide in the presentation is affected. Using this feature, one can also modify single slide layouts.
To select Slide Master command, go to View then select the Slide Master Command, and the Slide Master view will appear on the screen.
Therefore, View Master is the correct answer.
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
You never said what language so I used C
#include <stdio.h>
<span>int main () { </span>
<span> int a; </span>
<span> for( a = 3; a > 0; a-- ){ </span>
<span> printf("%i \n", a); }</span>
<span> printf(" Blast OFF !!!\n"); </span>
<span>return 0; </span>
<span>}</span>
Answer:
Hardware security module.
Explanation:
Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.
It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.