1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
12

Select the correct text in the passage.

Computers and Technology
1 answer:
Maurinko [17]3 years ago
7 0

Answer:

some parents have replaced the customary practice of reading a bedtime story to childern with a television show of the child's choice

Explanation:

You might be interested in
Is C++ a high-level or low-level programming language? What about HTML?
N76 [4]

Answer:

c++ is low level

html high level

Explanation:

6 0
3 years ago
What is the appropriate formula used to determine the area of a surface
Sholpan [36]

Answer:

om2

Explanation:

5 0
4 years ago
Read 2 more answers
The strongest normal form that R=AB is in is? a. not known since we don't know the set of functional dependencies b. 2nf c. 3nf
Firlakuza [10]

A correct option is option (a). The strongest normal form that R=AB is in is not known since we don't know the set of functional dependencies

What are functional dependencies?

An association between two attributes, often the PK and other non-key properties in a database, is known as a functional dependency (FD). If the value of attribute X (often the PK) impacts the value of attribute Y in a unique way for each valid instance of X, then attribute Y is functionally dependent on attribute X for any relation R.

How do you identify functional dependency?

  • When two different values of B are related to the same A, this is known as a "functional dependency" A->B.
  • A key must be distinct, therefore even if two tuples contain the same value for one or more attributes, the key values must differ.

Learn more about dependency: brainly.com/question/22276156

#SPJ4

5 0
2 years ago
An operating system____a password for a given user, converting it into a representation that cannot be understood without the ap
Ierofanga [76]

An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm

3 encrypts

<u>Explanation:</u>

Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.

In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.

Cracks: - some algorithm was used to crack password of login for operating system access.

Reverses- it a process or algorithm where reverse   password or example: - 1234 where password in reverse process 4321.

Encrypts:- A password is  encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.

Decrypts is reverse logic applied based on encrypts technology.

6 0
3 years ago
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monito
Setler [38]

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

4 0
3 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • 8 POINTS!!!!!!!!
    6·2 answers
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • Define a function below called average_strings. The function takes one argument: a list of strings. Complete the function so tha
    11·1 answer
  • What are examples of intermediate goals that require funding? Check all that apply.
    6·2 answers
  • Modify an array's elements Write a for loop that iterates from 1 to numberSamples to double any element's value in dataSamples t
    11·1 answer
  • Which of the following statements is true of computer networks?
    6·1 answer
  • . ------------ means that the two merging companiesbecame history and a new firm
    10·1 answer
  • Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8
    8·1 answer
  • Why is it important to follow a consistent naming convention for variables?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!