1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da

ta center.A. key-card.B. mantrapC. video surveillance systemD. technical safeguard
Computers and Technology
1 answer:
Whitepunk [10]3 years ago
7 0
Answer: c

Explanation: video surveillance system
You might be interested in
How has the internet improved business communication worldwide
emmasim [6.3K]

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

4 0
2 years ago
What is computing networking​
andre [41]
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
6 0
3 years ago
Technician A says that temperature sensors decrease in resistance as the temperature​ increases; this is called positive tempera
Reika [66]

Answer:

Technician B.

Explanation:

The claim of technician B that some vehicle manufacturers use a stepped ECT circuit inside the PCM to broaden the accuracy of the sensor is correct.

6 0
3 years ago
Where are methods listed in a UML class diagram showing three parts?
denis23 [38]

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

3 0
2 years ago
How does electricity work in phones?
kati45 [8]
Great Question! So the plug will go into the wall and electricity will hit the cord and power through the cord into the charger (Cordless) Now if you talking mobile phones such as iPhones. The battery powers wire and hardware to power your little mobile phone! Hope this helps.
8 0
3 years ago
Other questions:
  • What does the Autosum feature on excel do?
    15·1 answer
  • Which is the last step in conducting a url research
    11·1 answer
  • business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
    9·1 answer
  • What is the unique impact him professionals have on coded data?
    11·1 answer
  • Write a function called median, that takes as parameter a full, sorted array of doubles and returns the median of the list. For
    15·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • Which one is correct
    8·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • QUESTION 4
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!