1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
6

Neview of related literature happens in two wayo (1) Traditional and

Computers and Technology
1 answer:
Greeley [361]3 years ago
8 0

Answer:

I dont know the question all i know is the answers or whatever

Explanation:

You might be interested in
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
Which of the following software programs provides for e-mail communication?. A. Access. B. Word Perfect. C. Outlook. D. Excel
torisob [31]

There are several software programs and internet applications that you use to send electronic mail (e-mail) to other people. However, for programs that are part of the Microsoft Suite, only one provides this ability, which is (C) Outlook.  

Microsoft Access is used to manage databases, while Microsoft Excel is used to analyze numerical and text data. WordPerfect is a word processor software created by Corel.  


5 0
3 years ago
Read 2 more answers
Uinjsiodj9fijsdiokjdwe0okakj09dw9j09jw09
erica [24]

Answer:

hi

Explanation:

hii

3 0
3 years ago
Read 2 more answers
What is used to configure data sources for applications that require access to a database?
Radda [10]
A network is used to configure data sources for applications that require access to a database?
6 0
4 years ago
Consider the following method: static void nPrint(String a, int n) { System.out.println(a.charAt(n)); } What potential error cou
Juliette [100K]
<span>Briefly explain why it is necessary to critique a scientific argument before it is accepted.
</span>
4 0
3 years ago
Other questions:
  • Days of the week are represented as three-letter strings ("Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"). Write a javaScript f
    14·1 answer
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • What does Al stand for?
    10·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!