1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

What happen if there is no authentication??

Computers and Technology
2 answers:
creativ13 [48]3 years ago
7 0

Answer:

anyone could access something and hack others

Explanation:

Luda [366]3 years ago
4 0

Answer:

without it you wont have privacy or your password or any otter security's will be exposed by them hacking as well.

You might be interested in
Virtualization:
Sedaia [141]

Answer:

C. can boost server utilization rates to 70% or higher.

Explanation:

Virtualization -

It is the process of running virtual instance of the computer in the abstracted layer from the very actual hardware , is known as virtualization .

In this process multiple operating system can be operated on the single computer setup , it is useful for increasing the speed of the program.

Hence, from the question,

The correct statement with respect to virtualization is C. can boost server utilization rates to 70% or higher .

8 0
3 years ago
You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
san4es73 [151]

Answer:

1. You can invoke or call a method from another program or method: TRUE

2. When methods must share data, you can pass the data into and return the data out of methods: TRUE

3. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant: TRUE

Explanation:

4 0
3 years ago
Que significa el término “Informática”?
Ad libitum [116K]

Answer:

Explanation:

proviene del francés informatique, implementado por el ingeniero Philippe Dreyfus a comienzos de la década del '60. ... De esta forma, la informática se refiere al procesamiento automático de información mediante dispositivos electrónicos y sistemas computacionales.

4 0
3 years ago
1. Grade data is:
horrorfan [7]

Answer:

1.)

import math

def min_max(lst):

   minimum = math.inf

   maximum = -math.inf

   for x in lst:

       if minimum > x:

           minimum = x

       elif maximum < x:

           maximum = x

   return minimum, maximum

2.)

def deltaGrade(lst):

   sm = 0  #sm is sum

   for x in lst:

       sm += x

   mean = sm/len(lst)

   deltaG = 75 - mean

   return deltaG

7 0
3 years ago
A new computer workstation has been installed in a small office. the user of the workstation can print a document using a networ
ICE Princess25 [194]
The printer is setup as a local printer therefore it does not need access to internet to access the local network printer. Once the new workstation is given access to the terminal server used for the printer, it will not need to connect on the internet to print. Now, if the workstation is not able to access the internet it could be potentially due to incorrect configuration of DNS to the workstation or actual issue is within the ISP.
3 0
3 years ago
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • In a paragraph of no less than 125 words, describe how technology helps business professionals to be more efficient. Include exa
    12·2 answers
  • Why should the data in a reservation system that is constantly being updated be stored on a magnetic disk instead of a CD or DVD
    15·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • What is application software used for
    13·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    5·1 answer
  • 5 efectos del desarrollo tecnológico en el medio ambiente
    14·1 answer
  • In order to view a page break what should you do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!