1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
2 years ago
6

Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?

Computers and Technology
1 answer:
hichkok12 [17]2 years ago
4 0

Answer:

D. Restrict user access to the server center by using keycards

Explanation:

A keycard is a modern smart plastic card with an application programming interface. It stores a digital signature on an embedded magnetized strip that is used to operate an electronic access control lock instead of using a key to open a door.

You might be interested in
Write a 20 charecter poem! for points! :)
umka21 [38]
The sky was blue
Glistening clouds in the air
For the little boy had no clue
His mother sat him down on the warm chair

There’s some great news
Hitler took over
And they killed off the Jews
The little boy just wanted to show mom his 4 leaf clover
7 0
2 years ago
Read 2 more answers
which tool in administrative tools should you open if you want to view messages to troubleshoot errors? a. resource monitor b. e
VikaD [51]

A tool in administrative tools which you should open if you want to view messages to troubleshoot errors is an: b. event viewer.

<h3>What is an operating system?</h3>

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

<h3>What is an event viewer?</h3>

An event viewer can be defined as an administrative tool that is found in all versions of Windows Operating System (OS) which is designed and developed to enable administrators and end users in viewing the event logs of software application and system messages such as errors on a local or remote machine.

In this context, we can reasonably infer and logically deduce that an event viewer is a tool in administrative tools which you should open if you want to view messages to troubleshoot errors.

Read more on event viewer here: brainly.com/question/14166392

#SPJ1

4 0
2 years ago
The question is in the photo
Anastaziya [24]

Answer:

a

the most suitable answer

8 0
2 years ago
Select the correct statement below about database services or database instances:
Zigmanuir [339]

The correct statement about database services or database instances is

( B).<u>An instance of the cloud database operates as a service that handles all application requests to work with the data in any of the databases managed by that instance.</u>

<u />

Explanation:

An instance of the Database Engine can be defined as a service that <u>all application requests to work with the data in any of the databases managed by that instance.The data can be on the same system or can be on another system </u>

So in case of a Cloud based database engine

( B).<u>An instance of the cloud database operates as a service that handles all application requests to work with the data in any of the databases managed by that instance.</u>

<u />

8 0
3 years ago
How do u friend people
Verdich [7]
You click on the three dots and click the person silhouette with the plus sign on it.
4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the best reason to delete Internet browsing history on a regular basis? to solve a computer hardware problem to protect
    13·2 answers
  • A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
    6·1 answer
  • What best describes deflation?
    9·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Write a pseudo-code that keeps asking the user for a given number 'n' different of zero, then print all numbers between one &amp
    8·1 answer
  • How can netiquette help you communicate when texting or instant messaging?
    6·1 answer
  • Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
    12·1 answer
  • Lil fun question : burgers or pizza??
    6·2 answers
  • PLZ ANSWER QUICKLY!!
    12·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!