1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
14

Six causes of data lost

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
4 0
What is the question here?
You might be interested in
A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him
DerKrebs [107]

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

3 0
2 years ago
On which tab can you find the margins button
insens350 [35]
In the tab key you alwAy use that to center
4 0
4 years ago
Read 2 more answers
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to
ivann1987 [24]

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

6 0
3 years ago
What are the letters associated with home rows keys?​
bulgar [2K]

Answer:

The letters are 'a s d f g h j k l ;' .These are the letters associated with the home keys.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • What division monitors the sale and registration of vehicles and vessels within the state?
    15·1 answer
  • If the force of gravity _ then the weight of an object will _
    8·2 answers
  • Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
    11·1 answer
  • Help i give 20 shekel
    9·1 answer
  • Managers can use __ software to discuss financial performance with the help of slides and charts
    11·1 answer
  • What is wrong with a MOV BL, CX instruction?
    6·1 answer
  • Select the correct answer from each drop-down menu.
    8·2 answers
  • What is the difference between functional and non-functional testing
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!