1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
8

Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots

Computers and Technology
1 answer:
Tresset [83]3 years ago
6 0

Answer:

B. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

Explanation:

You might be interested in
Which of the following is a camera problem that dirt can cause?
makkiz [27]

Answer:

all of the above

Explanation:

hope this helps:)

4 0
3 years ago
Read 2 more answers
What does it mean when your check engine light is blinking?
qwelly [4]
It means that the check engine light is about to misfire.
4 0
4 years ago
Frrrrrrrrrrreeeeeeeeee brainliest for u
sukhopar [10]

Answer:

Yay I want brainliest

Explanation:

5 0
3 years ago
Read 2 more answers
Jump to Question: Fill in the blanks below: The flow of electricty is similar to the movement of water through a pipe. The movem
HACTEHA [7]

The answer is;

Current  

Voltage  

Power/Wattage  

Circuit

Water moving through pipes is like electricity flowing in a circuit. The flow of electricity is an actual flow of electrons. That movement of electrons is what is known as current. Think of current as the volume of water flowing through a water pipe. The electrons need some force or pressure to move, and so is water in a pipe. The voltage is that electromotive force; the pressure that pushes the electrons in a system. The power measured in Watts is the rate at which the energy is consumed. For the current to flow the circuit must be complete. Otherwise we cannot say that we have power if the circuit is not closed.

5 0
4 years ago
The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the netw
Rama09 [41]

Answer:

A bandwidth is the maximum rate of transfer of data across a given path

Latency refers to the delay of data to travel or move between a source and destination

An example of a high bandwidth and high latency network is the Satellite Internet connectivity.

An example of a low bandwidth and latency network is the telephone system connection.

Explanation:

Solution

Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.

Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.

An example of a high bandwidth and high latency network is the Satellite internet connection.

Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.

So, satellite internet connection is compensated with high latency and high bandwidth.

An example of a low bandwidth and low latency network is the Telephony network.

Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.

3 0
3 years ago
Other questions:
  • Bit rate is a measure of how many bits of data are transmitted per second. Compared to videos with a higher bit rate, the same v
    13·1 answer
  • Because a vector container uses a dynamically allocated array to hold its elements,
    5·1 answer
  • How many bytes are in a yottabyte. (don't look it up)
    10·1 answer
  • Which of the following are the differences between DDR3 SDRAM and DDR2 SDRAM? DDR3 transfers data at twice the rate of DDR2. DDR
    7·1 answer
  • Describe conductors and insulators in terms of energy
    11·1 answer
  • To build a framework for security policies and controls, one can use the following approach: 1) document the concepts and princi
    12·1 answer
  • What is a filter in excel (please keep your answer brief)
    11·1 answer
  • I need help, help me please ..​
    11·1 answer
  • What type of computer is used in ATM?
    11·2 answers
  • 5. Why do we need programming language?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!