1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

What happen if there is no authentication??

Computers and Technology
2 answers:
creativ13 [48]3 years ago
7 0

Answer:

anyone could access something and hack others

Explanation:

Luda [366]3 years ago
4 0

Answer:

without it you wont have privacy or your password or any otter security's will be exposed by them hacking as well.

You might be interested in
Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In whic
katen-ka-za [31]

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

8 0
3 years ago
Which command provides the source refrence at the bottom of the current page of a document?
DENIUS [597]

Answer:

Footnote

Explanation:

The notes related to citation or reference or comment that is assigned to a text on that page is called footnote.

3 0
3 years ago
In three to five sentences, describe how you would move a slide from the end of the presentation to the second slide.
hjlf
You just hold on the slide you want to move and move it to the second slide.
3 0
2 years ago
Traveling abroad to have sex with underage children is known as?
insens350 [35]
The correct answer I believe is A Sex offender
3 0
3 years ago
Read 2 more answers
A computer user who purchases a software package that will not operate on his or her hardware configuration is a victim of which
Natalija [7]
Is this a math problem? I don't get what you are trying to say sorry
5 0
3 years ago
Other questions:
  • The item in this illustration that is highlighted is the _____. quick access tool bar view buttons status bar zoom control
    10·2 answers
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • Suppose one hundred stores participated in the
    14·1 answer
  • A ____ typically rests on the desk or other flat surface close to the user’s computer, and it is moved across the surface with
    13·1 answer
  • Higher-speed Ethernet technologies use an electronic device known as a Hub rather than a switch True/False
    15·1 answer
  • The method needed to arrange for an object to be notified when a window's close-window button has been clicked is
    6·1 answer
  • List the operating system you recommend, and write a sentence explaining why.
    8·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • Explain why a holiday on a cruise liner will be an ideal holiday​
    12·1 answer
  • When troubleshooting a network issue where a single host is unable to connect to the network, what is the first thing you should
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!