1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
11

1. Your company writes software for voting machines and needs to ensure that the software and documentation is carefully protect

ed on its servers. Last week, one of the servers was stolen from its machine room, but fortunately that server did not contain sensitive voting machine files. What folder and file security can your company use to protect its information in the future, so that even if a server is stolen its files cannot be accessed?
Computers and Technology
1 answer:
Talja [164]3 years ago
4 0

Answer:

Microsoft Encrypting File System

Explanation:

The Microsoft Encrypting File system is developed to encrypt files for protection from attackers. This is a feature that makes available filesystem-level encryption.

The Microsoft Encrypting File system can be used to encrypt files, directory or drive. When Windows is installed, no files are encrypted, however, this feature can be enabled.

Back to our scenario, to avoid the access to important files when a server is to enable the Microsoft Encrypting File System. This will ensure that the voting files on the drive are inaccessible, making files more secure.

You might be interested in
What is the term for a male reproductive cell?​
prohojiy [21]

Answer:

I believe it is a sperm cell.

Explanation:

Not a sex cell because that can apply to both female and male reproduction.

4 0
4 years ago
2. Why do old video games have large pixels and images with jagged edges?
egoroff_w [7]

Answer:

A

Explanation:

cuz yea

3 0
2 years ago
What is the lucky 3 digit today
victus00 [196]
That is an interactive question.
4 0
4 years ago
Which of the following represents knowledge as a set ofâ rules? A. Neural networks.B. Machine learning systems.C. Robotics.D. Ex
sveta [45]

Answer:

D. Expert systems

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;

I. Non-algorithmic processing.

II. Symbolic processing.

In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.

Hence, expert systems represents knowledge as a set of rules.

Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.

Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.

5 0
3 years ago
What do TCP/IP MEAN​
melomori [17]

Answer:IP is internet protocol, every router has one some routers are dynamic which means they change everything the router reboots and some routers are static which means you would have to call your isp(Internet Service Provider) to get it changed.

Explanation: I do illegal things :)

8 0
4 years ago
Other questions:
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • --------------------is a host that runs software to provide information, such as web content, to other hosts.
    9·1 answer
  • Which character is used to begin a comment?
    6·1 answer
  • Discuss the pros and cons of tombstoning versus multitasking. Why do you think Microsoft chose tombstoning?
    11·1 answer
  • If I wished to insert a hyperlink from text in my document to my company website, what type of link would I insert?
    9·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • Which type of computer network ensures high security
    10·1 answer
  • write a program with total change amount as an integer input and output the change using the fewest coins, one coin type per lin
    8·1 answer
  • Explain the reason why vector graphics are highly recommended for logo​
    5·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!