1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
11

Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary

events.
Computers and Technology
1 answer:
prisoha [69]3 years ago
7 0

Answer:

its only a escape from the harsh relaity

Explanation:

expection vs realaitly

You might be interested in
Use the table on the right to convert from binary to decimal.
postnew [5]

Answer:

There is no table, so I can only comment on the statements:

The binary value of decimal 10 is A.  ==> False, however A is a hexadecimal representation of 10.

The binary value of decimal 13 is 1001  ==> False, 13 would be 1101.

The binary value of decimal 15 is 1111.  ==> True.

The binary value of decimal 14 is E. ==> Again E is a hexadecimal representation of 14.

7 0
2 years ago
Read 2 more answers
Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
nikitadnepr [17]

Answer:

The answer is "auditors"

Explanation:

Description to this question can be described as follows:

  • Auditors are professionals who analyze business and corporate accounts to determine, that the financial reports are accurate and lawful. It will serve as a consultant to suggest possible measures for risk avoidance or cost reduction.
  • Data security is the mechanism to avoid theft, loss of sensitive information, and information quality is critical and it is not able to know or stay in contact with your clients without high-quality data, that's why auditors are the correct answer and other choices can't be defined in the following senior.
7 0
3 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
An audit trail is a record of how a transaction was handled from input through processing and output
Nostrana [21]

The answer is : True.  An audit trail is a record of how a transaction was handled from input through processing and output.  An audit trail is the evidence, such as purchase orders and invoices, that a financial transaction actually occurred.

6 0
3 years ago
Explain the purpose of Data Layer, in the Layered modelfor web applications?
matrenka [14]

Answer:

Purposes of Data Layer, in the Layered model for web applications are as following:-

1. The data Layer,is the third layer and it takes care of the all the operations concerning the database level.

2. This data layer gets a command from the application layer to send a query to the database and will process this command according to the type of database that is used.

3. It will ensure that the correct connections to the database are set.

4. It is represented by the Database.

7 0
3 years ago
Other questions:
  • A skier provides what in a landscape photograph of a mountain?
    14·2 answers
  • If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
    5·2 answers
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r
    6·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • The latest form of personal communication that most resembles a public journal is a _____.
    15·2 answers
  • Which of the following are mass communication methods? (Select all that apply.)
    9·1 answer
  • The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
    9·1 answer
  • A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.
    9·1 answer
  • What are general purpose computer and special purpose computer?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!