1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
4 years ago
5

What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical

control
Computers and Technology
1 answer:
Inessa [10]4 years ago
8 0

Answer:

Corrective Control

Explanation:

Physical Control are devices that limit access or otherwise protect a resource, such as fences, doors, locks and fire extinguishers.

Technical Control are devices or processes that limit access to resources. Examples include user authentication, antivirus software, and firewalls. Technical controls are also called <em>Logical Control</em>

Corrective Control repair the effects of damage from an attack.  Corrective contol include: include virus removal procedures, firewall table updates, and user authorisation database updates.

You might be interested in
Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
quester [9]

There are cells in some charts. The terms that refers to the cells that contain values and labels to be graphed in the chart is source data.

<h3>What is the meaning of source data?</h3>

Source data is known to be a kind of raw data that is often known as an atomic data. They are data that has not been processed for any vital use to become Information.

In computer programming tech., source data or data source is known to be a kind of primary point or location from where data originates from. The data source is known as a database, a dataset, etc.

Learn more about source data from

brainly.com/question/10838478?source=archive

7 0
2 years ago
After selecting the Slide Master tab (within the View tab), which actions can a user take to configure a slide master?
myrzilka [38]

Answer:

Yes those are the correct order.

Explanation:

5 0
3 years ago
What enables image processing, speech recognition, and complex game play in artificial intelligence?
Paraphin [41]

Deep Learning enables image processing, speech recognition, and complex game play in artificial intelligence.

<h3>What is Deep learning?</h3>

This is known to be a part of machine learning, and it is seen as  neural network that is made up of three or more layers which tries to simulate the behavior of the human brain.

Note that Deep Learning enables image processing, speech recognition, and complex game play in artificial intelligence.

See options below

1)Expert Systems

2)Deep Learning

3)Natural Language Understanding (NLU)

4)Artificial General Intelligence (AGI)

Learn more about Deep Learning from

brainly.com/question/27844272

#SPJ1

5 0
2 years ago
50 POINTS!!!
ycow [4]

Answer:

1. -> B.

2. -> C

3. -> A

Explanation:

1. Antennas = help the router fetch and transmit a signal

2. Repeaters = help in increasing the range of signal

3. Adapters = help the device detect a wireless signal

7 0
3 years ago
QUESTION: Which is not an example of a video port or cable?
Vikki [24]

Answer:

Radio Corporation of America (RCA)

Explanation:

A corporation is not a video connector.

8 0
3 years ago
Other questions:
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • Marcus just created a new folder specifically for his buisness records so he would like to move last months business transaction
    13·2 answers
  • Rebooting the computer is a good troubleshooting technique.<br><br> True<br> False
    6·2 answers
  • The command button to protect a document is part of the​.
    10·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
    9·1 answer
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!