1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

What happen if there is no authentication??

Computers and Technology
2 answers:
creativ13 [48]3 years ago
7 0

Answer:

anyone could access something and hack others

Explanation:

Luda [366]3 years ago
4 0

Answer:

without it you wont have privacy or your password or any otter security's will be exposed by them hacking as well.

You might be interested in
(d) What other services beside cloud-based software may be provided by Internet hosts?[1]
VashaNatasha [74]

Answer:

Internet

(Some have Cable TV)

7 0
3 years ago
What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar
Yuki888 [10]

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

4 0
3 years ago
Rerouting traffic using arp poisoning is an attack on ________ of a network.
Arada [10]
Rerouting traffic using ARP poisoning is an attack on both the functionality  and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page. 
5 0
3 years ago
Image files are grouped into two categories: _____.
EleoNora [17]
It is grouped according to raster and vector format. Raster format are images used in a computer or printed. Vector format stores data and is compressed. 

Examples of common raster formats usually used in a computer are; jpeg, png, bitmap, and gif. Vector formats are; CGM, SVG and 3D vector.
4 0
3 years ago
If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
11Alexandr11 [23.1K]
The answer is B) draft quality
8 0
3 years ago
Other questions:
  • Microsoft ________ is a cloud storage and file sharing service
    12·1 answer
  • Write a paragraph on the following topic.
    14·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • For questions 19 - 21, assume that Student, Employee and Retired are all subclasses of Person, and all four classes have differe
    9·1 answer
  • What is the multiple source test
    15·1 answer
  • People, can anyone point me a highlighter for google chorme ?
    11·1 answer
  • Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will
    5·1 answer
  • Question #5
    15·2 answers
  • What is the simplest form of backing up data?
    10·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!