1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
10

Does the security burden fall primarily on the user? On

Computers and Technology
1 answer:
liubo4ka [24]3 years ago
6 0

Answer:

yes and no because of the security

Explanation:

yes and no because of the security

You might be interested in
What can you create best in Word Online?
RUDIKE [14]

Answer: USE GOOGLE CHARTS

Explanation:

5 0
3 years ago
Read 2 more answers
Photography Questions 100 points!!!
Shtirlitz [24]

Answer:

<h2><u>Fill in the blanks</u></h2><h2><u>Question 1</u> </h2>

Patterns are <u>repeated</u>  shapes, colors, tones or objects.

<h2><u>Question 2 </u></h2>

What are two things you can do to strengthen a pattern image?

-Add in a person or frame it in a different way

-Look at it from different angles and frame it in different ways

<h2><u>Question 3</u></h2>

Patterns can be <u>man - made</u> and they can be found in nature.

<h2><u>Question 4 </u></h2>

When you are looking for man made patterns in a town or city, don't forget to look i<u>n front of you</u>

<h2><u>Question 5</u></h2>

What is one technique you can use to show scale and perspective in your photo?

- <u>add color </u>

7 0
3 years ago
Read 2 more answers
Before turning a series of items into a bulleted or numbered list, what must you do?
Gnom [1K]

Answer:

O Make sure there is a tab between each item. ​

Explanation:

We need to make sure that there is a tab in between each item. If we place the tab properly, we can indent. We require first level indentation, we need to insert one tab, and more tabs depend upon the number of indentation level we want. For the second level indentation we need the two tabs, and so on. Nothing else is required certainly, and once we place the tabs correctly then we can apply the bullets and numbering to the tabbed list.

8 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Which is the maximum number of nodes to which Ethernet is limited?<br> 656<br> 1024<br> 328<br> 1048
Nataliya [291]

Answer:

1024

Explanation:

The maximum number of nodes for segment in Ethernet is 1024.

<em>-kiniwih426</em>

6 0
2 years ago
Read 2 more answers
Other questions:
  • Match the following technologies with their applications.
    9·1 answer
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS
    12·1 answer
  • if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete
    5·1 answer
  • The standing toe touch is most likely to result in
    15·1 answer
  • A network technician incorrectly wired switch connections in your organization's network. It effectively disabled the switch as
    14·1 answer
  • If you want to change the speed of a layer's horizontal scrolling, what should you change?
    12·1 answer
  • What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
    15·1 answer
  • Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be s
    5·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!