1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
14

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil

ity of redundant hardware devices??
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
4 0
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
You might be interested in
Where can I watch all harry potter movies for free?
Ira Lisetskai [31]

Answer:

Ive streamed them before on DailyMotion

5 0
3 years ago
Computer-integrated manufacturing (CIM) includes manufacturing systems that have:
Allushta [10]

Answer:

The correct answer to the following question will be Option A.

Explanation:

It is generally understood today that perhaps the reach of computer applications and programs needs to expand throughout architecture and engineering to cover the company's corporate operations.

This technology comprises of machine learning or computer programmed to execute certain various tasks and transmit information from various sectors of that same business or market.

Some elements of CIM includes:

  • Controllers.
  • Connectors.
  • Printers.
  • Cables.
  • Workstations.
  • Terminal data access.
8 0
3 years ago
What advantage does digital storytelling have over oral storytelling traditions?
Marysya12 [62]
Pretty sure the answer is D
6 0
4 years ago
Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
SVEN [57.7K]

Answer:

True

Explanation:

Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False

Authorization is a set of rights defined for a subject and an object.

Authorization is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification.

4 0
3 years ago
Which of the following resources can be used by an OS to communicate with hardware? (Select 2)
faust18 [17]

Answer: Device drivers and system BIOS

Explanation:

The device drivers and the system BIOS are the resources that can be use by the operating system to communicate with the hardware.

Device drivers basically provide the software interface to the hardware devices and enable the operating system and many type of program to access the different hardware functions.

BIOS stand for the basic input and output system and it basically provide the link between the software and the hardware in the system. Technically the BIOS refers to the set of the device drivers in the computer system.  

3 0
3 years ago
Other questions:
  • Use a colon before a list and put one space after a colon. True False
    15·2 answers
  • What is a basic operation of computers
    13·1 answer
  • The endocrine system is composed of many parts of the body.<br> a)True<br> b)False
    11·2 answers
  • Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
    6·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
  • True/False: not is evaluated first; and is evaluated next; or is evaluated last.
    13·1 answer
  • Why should the Six-Step Process be considered as an iterative process?
    8·1 answer
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • Select all the correct answers.
    8·1 answer
  • I NEED THIS DONE NOW ASAP, PLS HELP ME
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!