1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
15

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.

This is done to ________.
Computers and Technology
1 answer:
const2013 [10]3 years ago
3 0

Answer:

achieve physical security

Explanation:

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to <u>achieve physical security </u>

You might be interested in
"A Windows laptop is being used by a teacher in an outdoor (but protected by an overhang) setting. What setting would ensure tha
iragen [17]

1.Click the battery btn and go into power option.

2.Go into "When to turn off display" from left side bar menu.

3.And select for brightness drop down as never dims the display.

This will make the display turn on, no matter if the PC keyboard btn or mouse hower is clicked or not.

4 0
3 years ago
Best company who provides the best ISP (internet service provider)?
valina [46]

Answer:

Explanation:

all internet service providers are garbage. especially in america.

so i will focus on only the positives about one. even though  i know a bunch of bad things about this one.

AT&T is super innovative in that they are bringing fiber optic to many homes in America. Fiber optic is a new type of wiring that brings the fastest Internet never seen before, at speeds of one gigabit per second or even more. Furthermore, their technicians tend to resolve any issues with routers at home.

5 0
2 years ago
Groupthink refers toA) the willingness of individual group members to withhold contrary or unpopular opinions, even when those o
Ivan

Answer:

The correct answer is A.

Explanation:

Groupthink is a theory that is applied to decision making psychology in groups, developed by Irving Janis. The theory roots itself to the problem of conformity especially in group settings. When a decision is made in a group, some members, even though they believe that the decision made is wrong or can be better, get caught up in the conformity problem and follow the accepted solution to allign with the group's decision.

I hope this answer helps.

5 0
3 years ago
The difference between tool bar and status bar​
Snowcat [4.5K]

Answer:

A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.

Explanation:

8 0
2 years ago
Data is physically transmitted from one computer or terminal to another in the ________ layer. physical transport application te
omeli [17]

Answer:

The correct answer to the following question will be "Physical".

Explanation:

  • The lowest layer of the OSI model is the physical layer. It's in charge of transferring bits through one device to the next.
  • This layer isn't worried about the importance of the components and deals with setting up a connection to the node of the network and transmitting and receiving a signal.

Therefore, the Physical layer is the right answer.

7 0
4 years ago
Other questions:
  • Explain a business scenario where management information systems plays a part.
    11·1 answer
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • To create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. I
    15·1 answer
  • When making any change to the database structure, we may need to check for effects of the change on ________.?
    14·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safet
    13·1 answer
  • All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
    12·1 answer
  • What is computer hacking?
    14·1 answer
  • What two functions does tcp/ip perform?
    15·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!