1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
4 years ago
15

A. True

Computers and Technology
1 answer:
Anuta_ua [19.1K]4 years ago
5 0
100% TRUE AND VERY IMPORTANT
In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

From my experience, limit the number of those with full access (1-2 people, 3 at most).
Also, perform daily backups. If this data is critical, you can set timers for it to be backed up during intervals in the day.
Relationship databases or databases that can be shared should only be shared for viewing.
You might be interested in
You must establish credit in order to buy a house true or false
iren2701 [21]

verry true, unless ou dont need a loan, if you have cash then the answer is false

8 0
4 years ago
Where can I find information regarding different career choices in AZCIS?
Vadim26 [7]
I think Internet is the best way to search career choices. You can get a lot information.

4 0
3 years ago
How does a USB flash drive get its files?
geniusboy [140]

Answer:

The flash drive is inserted into a computer's USB port, or type-A USB connector. The USB connector communicates between the drive and the computer. The computer recognizes the drive as a separate hard drive, allowing users to move files from the computer's hard drive to the flash drive.

6 0
3 years ago
-
gavmur [86]

Answer:

ur dad was born in 1991

Explanation:

so he ate my pucc

5 0
4 years ago
2. Imagine that the user at computer A wants to open a file that is on computer C's hard disk, in a peer-to-peer fashion. What p
Elis [28]

Answer:

Since there is no server in a peer-to-peer network, both computers will share resources through the network component used in linking them together such as a cable or a switch.

Explanation:

In its simplest form, a peer-to-peer (P2P) network is created when two or more computers (in this case computer A and C) are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files or through an Ethernet cable. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires using switches as a central connector. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

Please find attached the diagram of the peer-to-peer network of the two computers, computer A and computer. We have two network connections in the diagram.

The first one was implemented using a crossover Ethernet cable to connect both computers through the RJ45 LAN port on their network interface card.

In this network configuration, that will go through the NIC card from Computer C, through the cable to the NIC on computer A and vice versa.

In the second implementation, we used a switch to connect both computers using a straight Ethernet cable.

In this connection, data will go through the NIC card in computer C, through the cable connecting Computer C to the switch, through the switch, then through the cable connecting the switch to computer A and finally through the NIC card on computer A and vice versa

4 0
4 years ago
Other questions:
  • Assume that
    7·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • What is an objective of state-sponsored attackers?
    11·1 answer
  • A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
    10·1 answer
  • Why do bats sleep upside down
    7·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • George works for a print newspaper in which of these areas would you be interested to hire new recruits for the newspaper WHICH
    11·1 answer
  • Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
    14·1 answer
  • Which statement best describes the problem statement below?
    6·1 answer
  • How do you save a document in a format so that any reader can view it?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!