1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
4 years ago
9

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so t

hat only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company’s new security called?
A. Theft prevention.
B. Mantrap.
C. Entry control roster.
D. Security outpost.
Computers and Technology
1 answer:
goblinko [34]4 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Entry control roster).

Explanation:

A roster for entry controls includes a list of identities and descriptions of people that are going to access. A guard might have a list of recognized staff approved to connect a network channel capability or region.

  • Someone who tries to enter the region will indeed be reviewed, and then they will be refused access unless their identity isn't even on the list.
  • Once people visit, they'll need to display the credentials of the security officer that allows everyone to access the server farm.

So, it's the right answer.

You might be interested in
50 POINTS<br><br>Question linked in file below.
Ratling [72]

{{5,10,15,20},{25,30,35,40}} is answer where zero is not found.

<u>Explanation:</u>

This program finds zero in giving as arrays of value as a parameter. The program has two loop. One is a row of the array and the other is column loop for each row o an array. For loop is created with a  variable namer row and the loop ends with a length of the array of each row.

In side row for loop col loop is created and loop ends with each row-column length of cells. If data in each cell i.e (row, col)  calue is zero it returns true and the loop is terminated immediately.

In case if the value of the cell doesn’t found zero it never terminates the loop and continuous loop and returns a false value. Find Zero functions accept the two-dimensional array and check whether cell value is zero. If it is zero found return true otherwise it returns false.

7 0
3 years ago
FS EVERFI:
Snowcat [4.5K]

Answer:

A) work study program

Explanation:

Because you need experience and scholarships don't always pay, so this is the best choice.

6 0
2 years ago
Read 2 more answers
which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack
Archy [21]

The dual-layer-IP allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack.

<h3>What is the dual IP layer?</h3>

The word dual-stack is a word that connote a full or total duplication of all stages in the protocol stack ranging from its applications to the network layer.

Note that the dual-layer-IP method often gives room for a computer to run IPv4 and IPv6 simultaneously  at the network layer, and all of the IP stack can access a different TCP/UDP stack.

Learn more about  architecture  from

brainly.com/question/9760486

6 0
2 years ago
In one paragraph, explain how understanding social media influencing tactics has impacted the way you see social media posts in
Fofino [41]

Answer:

Social media influencing tactics has impacted the way I see social media posts in your daily life in the sense that if influences what posts I see and what posts I interact with.

Explanation:

Some examples of social media influencing tactics include ads, videos, social media influencers and so on.

When for example, and ad pops up on my social network and I click on it, similar ads of different products would appear later on my social network. In this way, my interaction with that ad has brought up similar ads to my attention. Likewise interaction with videos and social media influencers. When i interact with one video or social media influencer, a similar video or social media influencer is brought up to my attention in my feed.

4 0
3 years ago
Phillip wants to create a new Google Display Ad campaign and base his targeting on an existing remarketing list named Checkout A
77julia77 [94]

Answer:

Similar Audience that finds who are similar to those on the Checkout Abandoners list.

Explanation:

Phillip needs to develop the latest google Display Advertising project, as well as focus its aiming over a current Checkout Abandoners shopping list. Thus, that Similar Audience which identifies users specific for others throughout the Abandoners checkout detail to support Phillip accomplish his promotional objectives.

3 0
3 years ago
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    5·1 answer
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • When parking uphill on a street with no curb, how should your front wheels be positioned? A. Turned to the left (toward the stre
    14·2 answers
  • A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
    12·2 answers
  • Select the two statements below that are true. Press on the info button for
    13·1 answer
  • Hat is the purpose of the domain name?
    7·2 answers
  • Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)
    13·1 answer
  • Why hackers hack?? in other people?​
    8·2 answers
  • Why can't I register for Brainly?? I've been trying for months, too! I've noticed this question has been asked so many times, bu
    7·1 answer
  • If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!