Answer:
you could send a email to your teacher to fix the problem
Explanation:
Make the presentation goofy so they will be more into it . your welcome
Answer:
The correct answer to the following question will be "Telnet provides a piece of login information in simple text, while this type of information is encrypted by SSH".
Explanation:
If you're using a distribution of Linux for a long period and maybe you're no longer a newbie on Linux, you might also have come through words such as telnet or SSH.
- Today SSH is just the main application for Access to the internet between connected devices and repositories.
- Telnet was the shared abbreviation of networking and communications and is the most well-known networking application for the UNIX framework.
So, it's the right answer.
Answer: ensuring that a system is not changed by a subject that is not authorized to do so
Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion