1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
5

Can someone help me with this lab assignment? I really do not know what should I do?

Computers and Technology
1 answer:
blondinia [14]3 years ago
4 0

Answer:

your question is too long to read

Explanation:

try explaining it in fewer words

You might be interested in
Introduction to graphic design please help! Define the four terms: design ,art,decoration , and visual literacy. Describe how th
erastovalidia [21]
Graphic design involves activities , usually done on the computer in which pictures, graphs, text and other elements are combined as a edit to books, magazines, advertisements. 
Activities which are part from this job are:
Design: the creation of ideas, plans and finally creation of object, pictures,...
Art: expressing the imagination through different ways of expression/ 
Decoration: adding something to the graphic design in order to look and act nicer
Visual literacy: the ability to understand existing trends and to learn new ones
8 0
3 years ago
SOMEONE PLEASE HELP ASAP!!
m_a_m_a [10]
For number 3 I believe the answer is A\
6 0
4 years ago
Read 2 more answers
According to the computer science what isCD ROM is a ​
sesenic [268]
A CD-ROM (/ˌsiːdiːˈrɒm/, compact disc read-only memory) is a pre-pressed optical compact disc that contains data. Computers can read—but not write to or erase—CD-ROMs, i.e. it is a type of read-only memory.
Read mechanism: 600-780nm laser diode, 150 ...
Usage: Data storage
Capacity: 194 MiB (8 cm), 650–900 MiB (12 cm)

Hope this helps...
4 0
4 years ago
What button is marked with the little hollow square at the top of the right window
andrew11 [14]

Next to the close-window-button, is the minimize/maximize button
5 0
3 years ago
Read 2 more answers
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
Other questions:
  • In what order are ribbons organized? From Microsoft Word
    7·1 answer
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo
    7·1 answer
  • Can anyone help with this graded assignment for computer fundamentals
    10·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
  • Weird canvas submission, I’ve done directly what the directions say to do to submit it, but it won’t submit
    15·1 answer
  • Activities provided for the satisfaction of others and consumed at the time of purchase<br> are…
    6·1 answer
  • What are the four major software packages of microsoft​
    11·1 answer
  • Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
    8·2 answers
  • When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the sa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!