1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
4 years ago
9

The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se

rver, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network.
Computers and Technology
2 answers:
denis23 [38]4 years ago
5 0

Answer:

1. Data at rest

2. Data in Transit

Explanation:

Data at rest and Data in transit are different approaches to Data Protection.  

Data at Rest from its definition means data that is idle i.e data that is not actively moving on the network or devices. Data at rest are more valuable to attackers and it is less susceptible to attack. Data at rest can include data stored in different storage devices like FlashDrive, DVD, CD, Hard Drive, e.t.c. it is also known as <em>IDLE DATA</em>

Data in Transit from its name means data that is actively moving from one location to another across the network. Data in Transit can be easily attacked and is considered to be less safe. It can be called <em>DATA IN MOTION.</em>

Vinvika [58]4 years ago
4 0

Answer:

The term "Local storage"denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term "hosted storage," "Internet storage" or "cloud storage." denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network

You might be interested in
on early ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (l
zhenek [66]

We can actually deduce that today, the situation is alleviated on larger networks because each computer has a dedicated wire connected to a <u>switch </u>that controls a portion of the LAN.

<h3>What is internet network?</h3>

Internet is known to be a system that has improved communication by providing a framework whereby all computer networks can interact and interconnect.

Internet was known to have emerged from the United States around the 1970s. Today, alot of people have access to the internet.

We see here that the situation that was presented above is alleviated on larger networks because each computer has a dedicated wire connected to a <u>switch </u>that controls a portion of the LAN.

Learn more about internet on brainly.com/question/13467876

#SPJ1

4 0
2 years ago
write the implementation (.cpp file) of the gastank class of the previous exercise. the full specifiction of the class is:
o-na [289]

Answer: (no specifications)

Explanation:

Given that there is nothing listed about the class there would be no specifications for the class. This part of the question will not provide you with enough information to write code.

4 0
3 years ago
Write a method named countInRange that accepts three parameters: an ArrayList of integers, a minimum and maximum integer, and re
marissa [1.9K]

Answer:

In Java:

The method is as follows:

public static int countInRange (ArrayList<Integer> MyList, int min, int max) {  

       int count = 0;

       for (int i = 0; i < MyList.size(); i++)  {

           if(MyList.get(i)>=min && MyList.get(i)<=max){

               count++;

           }  

       }

       return count;

 }

Explanation:

This defines the method

public static int countInRange (ArrayList<Integer> MyList, int min, int max) {

This declares and initializes count to 0  

       int count = 0;

This iterates through the ArrayList

       for (int i = 0; i < MyList.size(); i++)  {

This checks if current ArrayList element is between min and max (inclusive)

           if(MyList.get(i)>=min && MyList.get(i)<=max){

If yes, increase count by 1

               count++;

           }  

       }

This returns count

       return count;

 }

To call the method from main, use:

countInRange(v,m,n)

<em>Where v is the name of the ArrayList, m and n are the min and max respectively.</em>

6 0
3 years ago
_____ is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a compan
AVprozaik [17]

Answer:

The answer is "whistle-blowing".

Explanation:

Whistleblowing is the organization's disclosure Part of the illegal immoral or existing. Unauthorized actions under the administrative influence. In this the workers, people or organizations operate to perform.

  • The main objective of this initiative is to eliminate non-ethical organizational behavior.  
  • It provides integrity or by being truthful throughout all times, doing all the correct thing is a key element of professional morality and conduct.
4 0
3 years ago
Susan is a bookstore owner who maintains sales records in a spreadsheet. She wants to highlight the records that show sales in e
Lesechka [4]

Answer:

Conditional formatting will enable her to highlight the records with sales in excess of 100.

Explanation:

On the ribbon home button select conditional formatting. A menu will open to select highlight type.Next select a conditional operator. You can select an operator from that menu or define your own custom rule.Next select column to apply rule on and specify color coding(green) for matched results.Press Ok and close window. Now all the cell with sale in excess will be highlighted in the color coding specified earlier(green).

4 0
3 years ago
Other questions:
  • What are 3 things that can make cyberbullying especially harmful​
    12·1 answer
  • Which command runs poweroff.target to shutdown the system?
    11·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • True or False?
    8·1 answer
  • How does acceleration differ from velocity?
    15·1 answer
  • An unauthorized user is a network _______ issue.
    11·1 answer
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • Define data, information and the relation between the two?
    8·1 answer
  • My Macbook computer charger is burned from the side od the cord. -_- Great way to start school. Anything i should do?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!