1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
4 years ago
9

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so t

hat only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company’s new security called?
A. Theft prevention.
B. Mantrap.
C. Entry control roster.
D. Security outpost.
Computers and Technology
1 answer:
goblinko [34]4 years ago
8 0

Answer:

The correct answer to the following question will be Option C (Entry control roster).

Explanation:

A roster for entry controls includes a list of identities and descriptions of people that are going to access. A guard might have a list of recognized staff approved to connect a network channel capability or region.

  • Someone who tries to enter the region will indeed be reviewed, and then they will be refused access unless their identity isn't even on the list.
  • Once people visit, they'll need to display the credentials of the security officer that allows everyone to access the server farm.

So, it's the right answer.

You might be interested in
The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
Anestetic [448]

Answer:

D. Topic Sentence

Explanation:

4 0
3 years ago
_________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
Blizzard [7]

Answer:

Digital Signature

Explanation:

Digital Signatures are used in electronic messages to verify the sender's ıdentity. It is a online signature and highly secure way of proving identity.

The Signature is <em>encrypted</em> and can be decoded using <em>public-key</em> .

Digital signatures are certificated uniquely from accredited providers, encrypted and can be validated by certificate authorities.

Messages with digital signatures prove that the message sent by the owner of the signature and didn't changed on the way.

4 0
4 years ago
Is anyone else experiencing the wording::nonifacation::glitch about the "5 hours ago" thingy to whenever you answer a question o
sineoko [7]
I was unable to click on any of my notifications but that got fixed on its own a day later. 
5 0
3 years ago
Read 2 more answers
What is the output of the following program?
Contact [7]

The question is poorly formatted:

<em>#include <stdio.h> </em>

<em>int main() { </em>

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em>arr [1] = 0; </em>

<em>arr [3] = 0; </em>

<em>for (int i = 0;i < 5; i+=1) </em>

<em>printf("%d", arr[i]); </em>

<em>return 0; </em>

<em>}</em>

Answer:

The output is 10305

Explanation:

I'll start my explanation from the third line

This line declares and initializes integer array arr of 5 integer values

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em />

This line sets the value of arr[1] to 0

<em>arr [1] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 4, 5};</em>

This line sets the value of arr[3] to 0

<em>arr [3] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 0, 5};</em>

<em />

The next two lines is an iteration;

The first line of the iteration iterates the value of i order from 0 to 4

<em>for (int i = 0;i < 5; i+=1) </em>

<em />

This line prints all elements of array arr from arr[0] to arr[4]

<em>printf("%d", arr[i]); </em>

<em />

<em>So, the output will be 10305</em>

3 0
3 years ago
The specific instructions that a computing device needs to boot up and control the hardware
dlinn [17]

Answer:

Firmware

Explanation:

7 0
3 years ago
Other questions:
  • When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
    15·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early
    12·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • How does the Problem-solving Process help us to solve everyday Problems?
    13·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • Is Brainly cheating??
    10·2 answers
  • What do you think Amazon should fix?
    13·2 answers
  • What are different social phenomenas are you aware of that used part of a social movement, change, or cause
    14·1 answer
  • Michelle has defined a custom object by creating an object literal. She wants to access the properties of the custom object. Mic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!