1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
14

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and softwa

re for improving reliability, a way of ensuring availability in case of a system failure.
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
6 0

Answer:

Fault tolerant system

Explanation:

Fault tolerance is the property that keeps a system operating properly in the event of a failure of one of the components within the system

A fault tolerant system enables the system to continue its operation possibly at a reduced level, rather than having the whole system breakdown.

A good security expert understands the need for fault tolerance in a comprehensive security system, as the absence of this can lead to serious security breaches once the whole system is down.

You might be interested in
Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for
elixir [45]

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

3 0
2 years ago
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
3 years ago
For most people, the most effective way to save is:
oksian1 [2.3K]
I would say it's by creating a spending budget. 
3 0
3 years ago
Consider the following code segment:
Leni [432]

The code segment is an illustration of loops and arrays

<h3>What is a loop?</h3>

A loop is a program statement used to perform repetitive operations

<h3>What is an array?</h3>

An array is a variable used to hold multiple values

<h3>How to analyze the program?</h3>

The loop of the program adds the index 0 elements of the first and the second row of the 2-dimensional array.

From the program, the numbers to add are 1 and 100

The sum of 1 and 100 is 101

Hence, 101 will be displayed when the code segment is executed

Read more about code segments at:

brainly.com/question/26683418

7 0
2 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Other questions:
  • An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
    5·1 answer
  • A user is connecting to an e-commerce server to buy some widgets for a company. the user connects to the site and notices there
    10·1 answer
  • What is the advantage of video conferecing
    13·2 answers
  • A ____ error occurs when an instruction does not follow the grammar of the programming language
    6·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • What is a non-example of job skill
    13·1 answer
  • Who you think is better? Ninja or TFue ,btw do you know who icebear is?
    9·1 answer
  • Who wants brainliest? First to answer gets it....
    12·2 answers
  • CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
    11·1 answer
  • 1:A presentation program which is developed by Microsoft
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!