1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
4 years ago
14

Does the cloud solution offer equal or greater data security capabilities than those pro-vided by your organization’s data cente

r?
Computers and Technology
1 answer:
likoan [24]4 years ago
6 0

Answer:I think greater. Answer my question that I posted plz

Explanation:

You might be interested in
Given two int variables distance and speed, write an expression that divides distance by speed using floating point arithmetic,
Vsevolod [243]

Answer:

float(distance) / speed

Explanation:

Given the variable <em>distance</em> and <em>speed</em> in a program that hold a integer value respectively.  We can perform the division between the two variable using / operator. Since both distance and speed are integers, we need to convert one of them to float type to perform the floating point arithmetic. Otherwise the division output will be rounded up to the nearest integer which is not a desired result.

7 0
4 years ago
Computers store all characters as numbers stored as binary data. Each instruction or symbol gets a bit string assignment. The st
juin [17]

Answer:

0 and 1

Explanation:

Please mark brainliest

7 0
3 years ago
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
4 years ago
Read 2 more answers
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
An example of a target group might be people who:
Pie
C. They have something in common: they don't have access to social media.
7 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    6·1 answer
  • What are the features of the Outline view in Word? Select three options.
    9·1 answer
  • Which country does coriander come from
    11·2 answers
  • Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =e
    13·1 answer
  • 2. Which the following may be a reason for giving a Page Quality (PQ) rating og Highest? Select all that apply (True or False)
    14·1 answer
  • What is a warm site? Multiple Choice a separate facility that does not have any computer equipment but is a place where employee
    5·1 answer
  • Bruh my sister does bot understand what this means
    6·1 answer
  • Give one example of where augmented reality is used​
    11·2 answers
  • Which tab of the ribbon should you go to for removing gridlines on a worksheet?​
    14·1 answer
  • What is Error Code: 232011
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!