1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
2 years ago
5

2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary

Computers and Technology
1 answer:
ra1l [238]2 years ago
5 0

Answer:

They're necessary in order to ensure that we can all access the internet and access it easily and freely. About anyone can do just about anything. It isn't restricted to just certain people (or companies).

Explanation:

You might be interested in
Rules used by a computer network<br> A network protocol <br> B hierchary protocal<br> C procedure
maria [59]

Answer:

The answer is B hierchary protocal

4 0
3 years ago
What are the different components of the cloud architecture? The of the cloud architecture is the cloud, which is a collection o
tester [92]

Answer:

Cloud Architecture is basically consist of front end platform, back end platform, cloud and a network.

Explanation:

Front end platform consists of client and mobile device. while Back end platform consist of server and storage. The Cloud is the collection of data and Network is consist of Intranet and internet.

All the above mentioned components combined together to complete the architecture of cloud.

3 0
3 years ago
Someone, please answer this.
Sav [38]

Answer: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too. statement - Code to be repeated in the loop.

Explanation:

7 0
3 years ago
Use the following scale to rate yourself: (There is no wrong answer
Law Incorporation [45]
Doesnt have any picture
8 0
3 years ago
Which of the following policy guidelines specifies the restrictions on user access
Levart [38]

The policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

<h3>What is the Least Privilege Principle?</h3>

The least privilege principle can be described as a concept in information security and policy guidelines that gives a user minimum permission or levels of access that they are needed to execute a tasks.

Therefore, the policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

Learn more about least privilege on:

brainly.com/question/4365850

6 0
3 years ago
Other questions:
  • My computer have black spots and line
    7·2 answers
  • Plzzzzzzz help good answers only and best answer gets brainly
    5·1 answer
  • The wired or wireless means of connecting a computer to the internet is called a ________.
    9·1 answer
  • Movie that has a knife and shower​
    14·1 answer
  • You are setting up a desktop computer for an AutoCAD specialist who needs a minimum of 125GB of RAM. Which operating system belo
    6·1 answer
  • Explain Spreadsheet and its Basics
    13·1 answer
  • How would you define media literacy?
    12·1 answer
  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
    15·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Que significa el término “Informática”?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!