1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
3 years ago
6

TRUE OR FALSE!!!!!

Computers and Technology
2 answers:
VladimirAG [237]3 years ago
6 0
The answer is True.
Alborosie3 years ago
4 0

Answer: True

Explanation:

You might be interested in
5. Drawing Conclusions If you were a person in
mr Goodwill [35]

Answer:

During the medieval period, having membership in a guild was important for trade. It would ensure the products traded/sold were held to the standard and sold for the fair price.

8 0
3 years ago
Describe the following types of data hazards. RAW WAR WAW
aleksandr82 [10.1K]

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

5 0
3 years ago
ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
kolezko [41]

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

8 0
3 years ago
When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
Rasek [7]
Ddddddddddddddddddddddddddddddddddddddddd
7 0
3 years ago
Read 2 more answers
Fundamental of Computer Science
Anastaziya [24]

Answer:

Coding and Hardware Hacking

Explanation:

You can learn coding just as well through a online class or even on the internet through yo*tube than an in person class whereas it would be alot easier learning hardware hacking in person because you are given the opportunity to ask and can be corrected for small mistakes due to the task being manual. Coding can be learnt online independently if needed although so can hardware hacking but having a teacher to correct you and teach you handy tricks from their experience will get you further in that sense.

3 0
2 years ago
Other questions:
  • Failure to verify information can lead to?
    10·1 answer
  • Match the tool to its description.
    15·1 answer
  • Write a complete C++ program that do following. Read a positive integer from the user with proper prompt. Assume that this user
    9·1 answer
  • Oxygen-18 has an atomic number of 8. How many neutrons are in this isotope?
    7·1 answer
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • What type of cable would you use to connect two hosts together in a back-to-back configuration using twisted pair cable?
    15·1 answer
  • 1.Customer service is assistance provided by a company to the people who buy or use its products or services.
    13·2 answers
  • Which tool allows users to share code and also serves as a social networking
    10·1 answer
  • Select the correct answer.
    6·1 answer
  • 8. Which of the following is an output device
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!