1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
2 years ago
7

Maze must establish a communication channel between two data centers. After conducting a study, she came up with the idea of est

ablishing a wired connection between them since they have to communicate in unencrypted form. Considering the security requirements, Maze proposed using an alarmed carrier PDS over a hardened carrier PDS. Why would Maze make this suggestion in her proposal
Computers and Technology
1 answer:
kompoz [17]2 years ago
5 0

Maze makes this suggestion in her proposal because the alarmed carrier PDS is because it offers continuous monitoring and less periodic visual inspections.

<h3>What is Protected distribution system?</h3>

This is a carrier system which is used in communication network environment for detection of the presence of a physical intruder.

The alarmed carrier PDS is preferably used as a result of it offering high level of security without periodic visual inspections.

Read more about Protected distribution system here brainly.com/question/10619436

You might be interested in
A style ____ is a series of rules that defines the style for a web page or an entire web site.
inna [77]
Set is the answer have fun 
8 0
3 years ago
∀פפIN∀W∀ qwda dawdawdawdawd<br> BAN ME NOW
Dvinal [7]

Answer:

why

Explanation:

6 0
3 years ago
Isabel and Jared work for the same company but in different departments. Their workstations are both part of the company's compu
Nina [5.8K]

Network access limitations implemented from their local IT Department

3 0
3 years ago
Read 2 more answers
__________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors
kow [346]

Answer:

Quality assurance

Explanation:

8 0
3 years ago
Compared to using a command line, an advantage to using an operating system that employs a gui is ________.
artcher [175]

Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

<h3>What is operating system?</h3>

An operating system (OS) exists as the program that, after being initially loaded into the computer by a boot program, contains all of the other application programs on a computer. The application programs create use of the operating system by completing requests for services through a specified application program interface (API).

A GUI utilizes windows, icons, and menus to carry out commands, such as opening, deleting, and moving files. Although a GUI operating system is especially navigated using a mouse, a keyboard can also be utilized via keyboard shortcuts or arrow keys.

The GUI, a graphical user interface, exists as a form of user interface that permits users to interact with electronic devices via graphical icons and audio indicators such as primary notation, instead of text-based UIs, typed command labels, or text navigation.

Hence, Compared to using a command line, an benefit to using an operating system that employs a GUI exists you do not have to memorize complicated commands.

To learn more about operating system refer to:

brainly.com/question/22811693

#SPJ4

7 0
2 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • When you first open a ms word document, what is the name of the document located on the first line of the document?
    12·1 answer
  • Explain one way world war ii?-era advances in computers
    11·1 answer
  • A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
    7·1 answer
  • B.
    12·1 answer
  • As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
    8·1 answer
  • A customer has an application that is used by enterprise customers outside of AWS. Some of these customers use legacy firewalls
    9·1 answer
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • ____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!