1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
9

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so t

hat only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company’s new security called?
A. Theft prevention.
B. Mantrap.
C. Entry control roster.
D. Security outpost.
Computers and Technology
1 answer:
goblinko [34]3 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Entry control roster).

Explanation:

A roster for entry controls includes a list of identities and descriptions of people that are going to access. A guard might have a list of recognized staff approved to connect a network channel capability or region.

  • Someone who tries to enter the region will indeed be reviewed, and then they will be refused access unless their identity isn't even on the list.
  • Once people visit, they'll need to display the credentials of the security officer that allows everyone to access the server farm.

So, it's the right answer.

You might be interested in
To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
Andrej [43]

Answer:

D. Totals

Explanation:

Just like the microsoft excel spreadsheet, the microsoft access datasheet has similar tools. Although it is used to create and query databases, some functions carried out is excel can be done in access as well.

In the status bar at the bottom of the screen, certain parameter can be displayed for easy reference. If the totals or other statistical values needs to be included in the bottom status bar, go to the home tab and click on the "Totals" button.

4 0
3 years ago
What is the 16-bit hexadecimal representation of each of the following signed decimal integers?
Reil [10]

Answer:

FFE3

Explanation:

The 16 bit binary representation of 29 = 0000000000011101

The corresponding hexadecimal representation = 001D

Taking 2s complement, the binary representation of -29:

Step 1 : 1's complement of 29 = 1111111111100010

Step 2 : Adding 1 to 1's complement to get the 2's complement => 1111111111100010 + 1

= 1111111111100011

Converting the binary representation to equivalent hexadecimal format: FFE3

4 0
3 years ago
why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
salantis [7]

Answer:

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model

Explanation:

The following show how business affected the OSI model as a standard:

WRONG TIMING

When OSI was made, TCP / IP was already in use. Also nobody wanted to be the first to start using OSI.

POOR TECHNOLOGY

Both the presentation and session layer that was dedicated in OSI was very little.

The technology used was very difficult to understand.

BAD IMPLEMENTATION

The initial implementation of OSI model was very slow and the OSI layer 7 model had bad quality.

POLITICS

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model. They where rumors that the OSI was for the European and US government.

5 0
3 years ago
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
Artemon [7]

Answer:

They are changing schedules without proper notice, cutting workers without proper notice and falsely advertising.

Explanation:

8 0
3 years ago
Other questions:
  • Solve system of equations. <br>x+2y-z=4<br>2x-y+3z=8 <br>-2x+3y-2z=10
    12·1 answer
  • A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu
    8·1 answer
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • Which system utility can you use to troubleshoot a computer that's slow to start by enabling or disabling startup programs?
    7·2 answers
  • What is structured​ knowledge?
    10·1 answer
  • Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
    6·1 answer
  • PLS HELP ME!! WILL GIVE BRAINLIEST
    7·2 answers
  • Monster Collector
    7·1 answer
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • Sebutkan contoh komputer analog, komputer digital, dan komputer hybrid
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!