1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
9

What is the reason for taking care of design a good computer human interface ​

Computers and Technology
2 answers:
patriot [66]3 years ago
5 0

Answer:

So you can communicate and not ruin the opportunity to not.

anygoal [31]3 years ago
3 0

Answer:

computer is one of the part of our technology so that let's take care of it and improve so that we can used for better and sufficient ly not maybe now but maybe soon.

You might be interested in
You just got a shipment of 10 network-attached laser printers. You want these printers to always have the same address but you w
love history [14]

Answer:

Configure Reservations

Explanation:

The reason you do this, is because you are getting a permanent IP address assignment.

Hope this helps!

6 0
3 years ago
Floating point numbers?
blondinia [14]

Answer:

Thank you so much!!!

God bless you!!!

You the best!!!

Explanation:

4 0
3 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
SOMEONE PLEASE HELP ME OUT !!!!!!
GrogVix [38]

Answer:

not completly sure but i believe its the one that says inform the coach of where the goalies weak area...

Explanation:

8 0
2 years ago
What is bugtraq?
beks73 [17]

Answer:

The answer would be (C) An industry mailing list provided by Symantec that reports new vulnerabilities as they are discovered.

I hope this helped!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Universal containers wants to rollout new product bundles with several pricing options. Pricing options include product-price bu
    5·1 answer
  • You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the
    8·1 answer
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • Alcohol damages your __________, making it more difficult to understand how far away other objects are.
    14·1 answer
  • Your license can be canceled if you __________
    9·2 answers
  • Which type of ICS facility is used to temporarily position and account for personnel, supplies, and equipment awaiting assignmen
    15·1 answer
  • What can be can be considered data
    8·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • What is Identity Theft?
    8·1 answer
  • Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!