1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
2 years ago
10

Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None

Computers and Technology
1 answer:
Rudik [331]2 years ago
4 0

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

You might be interested in
_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after e
guapka [62]

Answer:

A register

Explanation:

Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.

There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.

Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

8 0
2 years ago
Code bãi gửi xe siêu thị thì được viết như nào?cho em xin ví dụ vs ạ?
Reil [10]

Answer:

https://sharecode.vn/source-code/phan-mem-gui-xe-dua-tren-cong-nghe-nhan-dien-bien-so-qrcode-20588.htm

3 0
2 years ago
Consider the series of alternating 1s and 0s 1 0 1 0 1 0 1 0 1 0 ...... The user will enter a number n . And you have to output
Vika [28.1K]

Answer:

# user is prompted to enter the value of n

n = int(input("Enter your number: "))

# if statement to check if n > 0

if (n > 0):

   # for-loop to loop through the value of n

   for digit in range(1, (n+1)):

       # if digit is odd, print 1

       if((digit % 2) == 1):

           print("1", end=" ")

       # else if digit is even print 0

       else:

           print("0", end=" ")

Explanation:

The code is written in Python and is well commented.

A sample output of the code execution is attached.

8 0
3 years ago
Increasingly patients are creating and maintaining personal health records (PHRs) with data from a variety of healthcare provide
mestny [16]

Researchers should carry out investigations on different platforms for providing PHRs, such as mobile phones, so as to complement PHRs.

<h3>What are PHRs?</h3>

PHRs is an acronym for personal health records and it can be defined as an electronic database (repositories) that are designed and developed to assist patients in accessing, managing and sharing their health information in a well-secured, private, and confidential manner.

Researchers carrying out experiments and investigations on different digital platforms that are used for providing PHRs, such as mobile phones, is a provision which should be included in a model privacy and security policy, in order to complement personal health records (PHRs).

Read more on personal health records here: brainly.com/question/15065417

#SPJ1

7 0
2 years ago
Consumers must learn how to separate the truth from __ techniques
dmitriy555 [2]

Consumers must learn how to separate the truth from deceptive techniques.

Explanation:

Deceptive advertisements are hazardous for both consumer and advertiser. It is a misrepresentation of the nature of products or services promoted falsely by advertisers.

Professionals exploit consumers by following means:

  • false or incomplete information,
  • fraudulent activities
  • deceptive practices.

It may involve -

  • financial theft,
  • health risks,
  • scams, etc.  

Having proper knowledge about such practices and taking legal actions against fraudsters can help claim for the damages incurred.

3 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • A plan to budget time for studying and activities is referred to as
    15·1 answer
  • An Operating System is an application just like any other applications we use on our computers. What makes an Operating System s
    12·1 answer
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • We use _____command to get data from the user? (python)
    8·1 answer
  • Which of the following is true about algorithms?
    9·1 answer
  • How to transfer bookmarks to new computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!