1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
5

What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical

control
Computers and Technology
1 answer:
Inessa [10]3 years ago
8 0

Answer:

Corrective Control

Explanation:

Physical Control are devices that limit access or otherwise protect a resource, such as fences, doors, locks and fire extinguishers.

Technical Control are devices or processes that limit access to resources. Examples include user authentication, antivirus software, and firewalls. Technical controls are also called <em>Logical Control</em>

Corrective Control repair the effects of damage from an attack.  Corrective contol include: include virus removal procedures, firewall table updates, and user authorisation database updates.

You might be interested in
In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
spayn [35]
Hello <span>August1859 
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Hope This Helps!
-Chris
8 0
3 years ago
What happens if a computer lags too much?
Makovka662 [10]

Answer:

it can overheat trying to process and from there multiple things may happen

1. the computer will recognise its overheating and automatically shutdown

2. the computer with catch on fire

3. the computer with crash the program and go back to the home screen

Explanation:

7 0
3 years ago
Read 2 more answers
How would you write this using Java: Use a TextField's setText method to set value 0 or 1 as a string?
katrin [286]

Answer:

Explanation:

The following Java code uses JavaFX to create a canvas in order to fit the 10x10 matrix and then automatically and randomly populates it with 0's and 1's using the setText method to set the values as a String

import javafx.application.Application;

import javafx.scene.Scene;

import javafx.scene.control.TextField;

import javafx.scene.layout.GridPane;

import javafx.stage.Stage;

public class Main extends Application {

   private static final int canvasHEIGHT = 300;

   private static final int canvasWIDTH = 300;

   public void start(Stage primaryStage) {

       GridPane pane = new GridPane();

       for (int i = 0; i < 10; i++) {

           for (int j = 0; j < 10; j++) {

               TextField text = new TextField();

               text.setText(Integer.toString((int)(Math.random() * 2)));

               text.setMinWidth(canvasWIDTH / 10.0);

               text.setMaxWidth(canvasWIDTH / 10.0);

               text.setMinHeight(canvasHEIGHT / 10.0);

               text.setMaxHeight(canvasHEIGHT / 10.0);

               pane.add(text, j, i);

           }

       }

       Scene scene = new Scene(pane, canvasWIDTH, canvasHEIGHT);

       primaryStage.setScene(scene);

       primaryStage.setMinWidth(canvasWIDTH);

       primaryStage.setMinHeight(canvasHEIGHT);

       primaryStage.setTitle("10 by 10 matrix");

       primaryStage.show();

   }

   public static void main(String[] args) {

       Application.launch(args);

   }

}

3 0
3 years ago
100 POINTS NEED ASAP PLEASE HELP
givi [52]

It is actually podcast! i took the quiz as well :)

3 0
3 years ago
Read 2 more answers
I dunno what to write my memo thing about ⁻³⁻
Alex73 [517]

Answer:

Wdym? I could help u

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable studentID that has bee
    10·1 answer
  • Who is the founder of javascript? ​
    14·2 answers
  • Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasti
    14·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Can an iphone user see when an android user is typing
    10·2 answers
  • ________models software in terms similar to those that people use to describe real- world objects.
    6·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • 1 point
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!