1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
5

Question #8

Computers and Technology
1 answer:
White raven [17]3 years ago
3 0

Answer:

The other person is correct the answer is 7

Explanation:

I got it right on edge

You might be interested in
A network technician has created a network consisting of an external internet connection, a DMZ,
Elden [556K]

Answer:

B.The admin private network allowing only admin access.

Explanation:

When the network technician created the network that consists of an external internet connection ,an internal private network,an administrative network and a DMZ.All the routers and the switches should be configured so that they can accept SSH connections from the admin private network that allows only admin access.

6 0
4 years ago
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
Ilia_Sergeevich [38]

Answer:

a. 0x00001844

Explanation:

When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.

8 0
3 years ago
Which two peripherals are not required to browse the internet?
Sever21 [200]

Answer:

DVD Drive, Headphones

Explanation:

You need a CPU for sure, it is the main component known as the Central Processing Unit, and it provides instructios for the computer. A monitor is needed to visually see the internet, without a monitor, you would just be looking at your PC.

Headphones are not necessary because they are for personal audio, and most of the time, the internet is not audio.

A DVD drive is used to play DVD disks, which contains videos, movies, games, etc. The internet is not on a DVD.]

-Chetan K

3 0
2 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
Which tab should you click if you want to access the Show All Comments option in a worksheet?
Lostsunrise [7]

Answer: Review

Because you want to review the comments

3 0
3 years ago
Read 2 more answers
Other questions:
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • A _____ is inserted so that a portion of a document that can have different formatting from the rest of the document. a. heading
    9·1 answer
  • ∑_(A,B,C,D,E)▒〖(2,4,6,8,10,12,14,16,18,20,22,24,26,28,30)〗
    8·1 answer
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the n
    7·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • The meaning of docile can be determined by the... context clue. synonym atonym or explanation
    14·2 answers
  • In the program below, which two variables have the same scope?
    9·2 answers
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and cred
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!