1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
9

What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and

device drivers The combination of hardware, software, and controls that work together to enforce a security policy
Computers and Technology
1 answer:
masha68 [24]3 years ago
7 0

Answer:

yuh

Explanation:

The trusted computing base of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system

You might be interested in
The contains the computer's "brain," the central processing unit (CPU).
baherus [9]

Answer:

Inside the computer case, on the motherboard. Hope this helps!

Explanation:

5 0
4 years ago
If you use the Justified option for a paragraph, the lines of text will __________.
saul85 [17]
The answer should be option A "<span>all be of equal length and line up at both margins." The justified option on Microsoft Word lines up the words at both margins, mainly used for types of writings and helped make the writing more neater or organized.

Hope this helps!</span>
5 0
3 years ago
Please help me on this it’s due now
Phoenix [80]

I would say the answer is <u>Logistics Manager, Material Handlers, and Inventory Managers.</u>

<u></u>

  • Definition:

            <u><em>Logistics Manager:</em></u><em> person in charge of overseeing the purchasing </em>

<em>                                             and distribution of products in a supply chain</em>

<em />

<em>             </em><u><em>Material Handlers:</em></u><em> responsible for storing, moving, and handling </em>

<em>                                             hazardous or non-hazardous materials</em>

<em />

<em>             </em><u><em>Inventory Managers:</em></u><em> oversee the inventory levels of businesses</em>

<em> </em>

<u></u>

Hope that helps!

6 0
2 years ago
A ____ rootkit is one that becomes a part of the system bootstrap process and is loaded every time the system boots. Select one:
Dmitriy789 [7]

Answer: d) Persistent rootkit

Explanation:

Persistent rootkit is the rootkit device that performs the constant function of getting loaded at every moment when the computer system gets started.This function is automatically executed .

  • Other options are incorrect because user-mode rootkit,kernel mode rootkit and memory-orientated rootkit are not devices that gets activated every time the computing system gets booted -up.
  • Thus, the correct option is option(d).
6 0
4 years ago
Fill in the blank: the final step of the dhcp discovery process is known as ______. Multiple choice, shuffle.
Ugo [173]

The configuration procedure moves into its final stage once the DHCP server has received the DHCPREQUEST message from the client. An acknowledgement packet, or DHCPACK, is sent to the client at this step.

<h3>What final step of the DHCP discovery process?</h3>

After selecting the proper IP address, the server sends the client an OFFER packet, and the client replies with a REQUEST packet. The process ends with the server sending an ACK packet to confirm that the client has received an IP address.

Therefore, DHCP may dynamically issue IP addresses to any Internet-connected device, node, or client computer.

Learn more about DHCP here:

brainly.com/question/28150867

#SPJ1

6 0
2 years ago
Other questions:
  • What phenomenon enables us to see animation in images
    7·1 answer
  • When a process becomes digital, it often becomes cheaper and the workflow becomes simpler. True False
    5·2 answers
  • Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which
    9·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • This assignment involves writing a program that models a dog. A dog has a name, a breed (which may be unknown), a gender (male o
    8·1 answer
  • Bluetooth headphones does or do not use wireless data transmission
    9·1 answer
  • The following program is run. Then the user clicks the "bottomButton" TWO TIMES. What will be displayed in the console?
    6·2 answers
  • Within the DNS system, a primary server (SOA) holds and maintains all records for the zone. Secondary servers will periodically
    11·1 answer
  • 1.
    7·1 answer
  • Name and define (or list the set that defines) three of the four common data types in programming
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!