1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
4 years ago
5

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

Computers and Technology
1 answer:
zzz [600]4 years ago
7 0
I'm pretty sure it's a Degausser.
You might be interested in
A list is a collection that ______________
BigorU [14]

Answer:

free points?

Explanation:

jk d

5 0
3 years ago
A. Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call mu
monitta

Answer: A. Voice over Internet Protocol

B. It reduces the delay for all objects requested by a user.

Explanation:

Voice over Internet Protocol is used to transfer voice communication and multimedia over the internet. It converts voice into a digital signal, transfers it over the internet and then reconverts it to voice when it reaches its destination.

Web Caching stores the data from a web page for reuse at a later time, this helps to reduce the tasks the server carries out and reduces delay. Because some objects are cached, more resources can be focused on objects that are not thereby reducing delay for all objects requested by a user.

6 0
4 years ago
You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a d
coldgirl [10]

You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a disaster recovery (DR) plan that will protect against the loss of critical data. The DR site must be at least 500 miles from your primary site and data transfer between the two sites must not traverse the public internet. The recommended disaster recovery plan is

<u>A. Create a new virtual cloud network (VCN) in the Phoenix region and create a subnet in one availability domain (AD) that is not currently being used by your production systems. Establish VCN peering between the production and DRsites.</u>

<u></u>

Explanation:

  • Local VCN peering is the process of connecting two VCNs in the same region and tenancy so that their resources can communicate using private IP addresses without routing the traffic over the internet or through your on-premises network.
  • You have a central VCN that has resources that you want to share with other VCNs.
  • A VCN is a customizable private network in Oracle Cloud Infrastructure. Just like a traditional data center network, a VCN provides you with complete control over your network environment.
  • A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network into multiple, smaller network segments.
  • A VCN resides in a single Oracle Cloud Infrastructure region and covers a single, contiguous IPv4 CIDR block of your choice.

4 0
3 years ago
Jacob wants to be a Steamfitter. He just finished his associate’s degree. Which best describes what he should do next?
romanna [79]
Bachelor's degree would be next in line .. im taking the test as well im going with A. 
8 0
3 years ago
Read 2 more answers
A type of memory that is expensive and therefore is often used only in cache memory applications.
tatuchka [14]
SRAM [STATIC] is a type of memory, it is five times faster than DRAM [which is found in most computers] and it depends on the use of electricity. It is designed in such a way that its constant refreshing is not require, it is much more expensive than the DRAM and it is therefore only used in cache memory application.<span />
6 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following agricultural clusters would require administrative and financial training? biotechnology agribusiness sys
    8·1 answer
  • What is the difference between requirements and controls in the security process? Give examples of each.
    11·1 answer
  • Which is the most accurate description of which cell contains a nucleus
    5·1 answer
  • In c++
    12·1 answer
  • Define the missing method. use "this" to distinguish the local member from the parameter name.
    11·2 answers
  • Our Client, a renowned trading company, suffered a sudden, devastating power outage that caused their server to cease functionin
    13·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO T
    11·1 answer
  • So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Some
    9·2 answers
  • Hello. I really need this done ASAP. Don't scroll down. JUst look please.
    14·2 answers
  • A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!