1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

What happen if there is no authentication??

Computers and Technology
2 answers:
creativ13 [48]3 years ago
7 0

Answer:

anyone could access something and hack others

Explanation:

Luda [366]3 years ago
4 0

Answer:

without it you wont have privacy or your password or any otter security's will be exposed by them hacking as well.

You might be interested in
Portable Document Format (PDF) is a file format that provides an electronic image of a document and can be viewed, printed, and
bogdanovich [222]
True a pdf is a file format that provides a electronic image of a document and it can be viewed, printed and electronically transmitted.
7 0
3 years ago
Read 2 more answers
1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
NeX [460]

Answer:

helthcare systems, aviation, entertainment, retail, etc

Explanation:

ICT has made life easy, it has made an interconection accross the world. in the helthcare system, ICT has created a positive impact because now a days body check up is been made through computers.

in the aviation, we use computers to control the the traffic of airplanes.

5 0
2 years ago
Which is true about TCP and UDP? Choose two answers.
vichka [17]

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

7 0
3 years ago
What is the most common option for fighting radiation?
tigry1 [53]
Lead Sheets, Plates, Slabs, & Foils.

Lead Shot
6 0
3 years ago
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
liq [111]
The number of bullet points on a slide should not exceed till 8
3 0
3 years ago
Other questions:
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • Load the titanic sample dataset from the Seaborn library into Python using a Pandas dataframe, and visualize the dataset. Create
    10·1 answer
  • Suppose you are on a desert island and possess exactly 20 coconuts your neighbor Friday is a fisherman and he is willing to trad
    14·1 answer
  • The purpose of an interface is to:___________
    5·1 answer
  • List any feature of drwing toolbal​
    5·1 answer
  • What is a traditional tool used to align and mark vertical points from top to bottom?
    10·1 answer
  • You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want t
    10·1 answer
  • What is the plan to make optimum usage of available spaces?
    15·1 answer
  • How would a barcode reader be used in a healthcare industry?​
    6·1 answer
  • ASAP 50 POINTS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!