1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
4 years ago
14

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.

This is done to ________. stop SQL injection attacks prevent unauthorized encryption provide physical security prevent email spoofing prevent brute force attacks
Computers and Technology
1 answer:
faltersainse [42]4 years ago
6 0

Answer:

Physical security

Explanation:

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to physical security. stop SQL injection attacks prevent unauthorized encryption provide physical security prevent email spoofing prevent brute force attacks

You might be interested in
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
What computer part do you need to make you’re pc run faster?
Alisiya [41]
There are multiple things that effect the speed of your computer such as the processer, RAM, and what is on the computer itself. The first question would be to figure out what might be slowing down your computer and the reason for needing the increase in speed. This will tell you what part you need and the steps to take.
3 0
3 years ago
Which site was launched by Ben t Smith iv
Kryger [21]

He launched the site "Wanderful Media".

5 0
3 years ago
An Agile Team decides they want to use pair programming in future Iterations. Where should this be captured? g
Umnica [9.8K]

Answer:

The decision to use pair programming by an Agile Team should be captured in their <em>Inspect and Adapt meeting notes.   </em>

Explanation: The underlying principle for having an agile team that the team is committed to constant incremental and or progressive improvement.

Inspect and Adapt Meeting Notes are notes which hold the summary of past achievements which hold and records of things to do going forward in order to ensure that there is progress and improvement over the last set of objectives.

These notes are usually taken at the Inspect and Adapt meeting. This is simply a meeting held at the end of each project milestone. An agile team during this meeting will review its performance, agree and document how it can be more effective.

Pair programming is also an Agile practice in the parlance of software development. Instead of the regular method where an individual is tasked with the development of an application, in this case, two programmers are tasked with the development of one App.

Sometimes this method is used during Extreme Programming (XP)

Cheers!

7 0
3 years ago
Thank you very much for your email. ...... was very interesting​
Fynjy0 [20]

Answer:

hi everyone how was your day :)

Explanation:

6 0
3 years ago
Other questions:
  • Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: The
    8·1 answer
  • Hardware- The ______________ equipment that makes up the computer.
    6·1 answer
  • Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the datab
    9·1 answer
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    8·1 answer
  • What is the processing speed for the second generation of computers​
    7·1 answer
  • Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.
    9·1 answer
  • In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!