1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
6

Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
4 0

Answer:

D. Restrict user access to the server center by using keycards

Explanation:

A keycard is a modern smart plastic card with an application programming interface. It stores a digital signature on an embedded magnetized strip that is used to operate an electronic access control lock instead of using a key to open a door.

You might be interested in
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
Find the gear ratio of the gear in the picture. <br><br> 25 points+brainliest
ankoles [38]

The gear ratios would look like A:B=1:9 and C:D=1:32 if you are just needing the gear teeth ratio. Not a lot of information to go off of from the question though

8 0
3 years ago
Given an input array of strings (characters) s, pick out the second column of data and convert it into a column vector of data.
hodyreva [135]

Answer:

Consider the following code.

Explanation:

save the following code in read_and_interp.m

 

function X = read_and_interp(s)

[m, n] = size(s);

X = zeros(m, 1);

for i = 1:m

if(str2num(s(i, 2:5)) == 9999)

% compute value based on previous and next entries in s array

% s(i, 2:5) retrieves columns 2-5 in ith row

X(i,1) = (str2num(s(i-1 ,2:5)) + str2num(s(i+1,2:5)))/2;

else

X(i,1) = str2num(s(i,2:5));

end

end

end

======================

Now you can use teh function as shown below

s = [ 'A' '0096' ; 'B' '0114' ; 'C' '9999' ; 'D' '0105' ; 'E' '0112' ];

read_and_interp(s)

output

ans =

96.000

114.000

109.500

105.000

112.000

7 0
3 years ago
Which of the following sets of data would be presented best in a histogram.
anastassius [24]
I do not believe you answer is right. I believe it would be B the average montly sales for the big toy company. Only documenting the last month is not enough information to make a histogram, and a histogram asks for information based on one subject not multiple subjects. Asking for the number of each type of candy sold last month would make a normal graph comparing the difference in how much each candy sold, so your answer should be B.
3 0
3 years ago
Place the steps in correct order for activating the resend option in Outlook. Choose Resend This Message Click Actions Open the
Dominik [7]

Answer:

1. Open the sent messages 2. Make additions/edits 3. Click actions                    4. Choose resend this Message  

Explanation:

I got It wrong on Edge, so it showed me the right answer

8 0
3 years ago
Other questions:
  • Whenever you are passing or another vehicle is passing you, _______ is particularly important to avoid collisions. A. Turning. B
    9·2 answers
  • What is this line of code doing? scanf("%f", &amp;height);
    6·1 answer
  • Why is it important to cite your sources?
    8·2 answers
  • Which of the following is a requirement for the Safety Data Sheet (SDS)?​
    5·1 answer
  • Careers in information technology deal with
    12·2 answers
  • The act of illegally copying software, music,or movies that are copied protect?
    7·2 answers
  • Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
    5·1 answer
  • How many passes will it take to find the five in this list?
    6·2 answers
  • What are the four steps for planning a table?​
    10·1 answer
  • What is the result of the following code?<br><br> x=7//2+10%2**4<br><br> print(x)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!