1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
9

What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?

Computers and Technology
1 answer:
motikmotik3 years ago
8 0
<span>Actually dod requires a digital type of authentication and a secure password inorder to access sensitive data on mobile devices and email, which may in the form of two step authentication code, then in the form digital phone calls, and then in the form of alphanumeric passwords and finally in the form of finger prints authentications or face recognition verification..</span>
You might be interested in
ou are working as a technician on a computer loaded with MS Windows. You boot the computer that has an incorrect driver loaded f
jeka94

Answer:

My Computer>>Properties>>Device Manager>>Video Card Properties>>Drivers Tab>>Roll Back Driver.

Explanation:

The user can do so by reverting the driver to the previous  version, The correct process to do so is by the Right Clicking on the computer menu and clicking device manager from the properties. In the device manager, click the properties of the video card and select the Drivers tab. In the Drivers tab, click on the Roll Back Driver. This will restore to the previous driver.

7 0
3 years ago
A strong example of using keywords would be a. Using “good” to remember the word “hideous” c. Both of these b. Using “hide” to r
posledela

The answer to the question you have asked is <u><em>"B" . </em></u> Because if you really think about it, there is no possible way that "Good" can be a keyword of "Hideous".

6 0
3 years ago
Core to resource management system is the _________that coordinates the server hardware.
vichka [17]
Hehdhdjdjddjdjid iridium chi jo j o j o j o j
5 0
3 years ago
Who is considered as the father of computer science​
Andru [333]

Answer:

Turing is considered as the father of computer science

4 0
3 years ago
Read 2 more answers
In the microsoft powerpoint wiew ribbon. Which presentation wiew enables a user to view one slide at a time in the slide pain?
german

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In the Microsoft PowerPoint view ribbon. A normal presentation view enables a user to view one slide at a time in the slide pain.

As we know that there are different views of presentation, such as, normal view, reading view, slider sorter, outline view, and note pages.

Only a Normal view allows you to see one slide at a time in the slide pain.

6 0
3 years ago
Other questions:
  • Which computing component is similar to the human brain
    6·2 answers
  • An item such as a smart card is an example of the _______ form of authentication.
    10·1 answer
  • New Jersey and New York have the highest state taxes in the United States. They also have high ratios of people moving out compa
    13·1 answer
  • I have wings, I am able to fly, I‘m not a bird yet I soar high in the sky. What am I?
    14·2 answers
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • "what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
    13·1 answer
  • ____ occurs when two nodes simultaneously check a channel, determine that it is free, and begin to transmit.
    9·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • Giusp minfg gấp vs ạ đáp án thôi nhé
    15·1 answer
  • If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!