1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
15

Physical access control should address not just computers and other IS equipment but also locations of wiring used to connect sy

stems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
A. True
B. False
Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
4 0

Answer:

A. True

Explanation:

Physical Access control mainly refers to the controls which are placed to ensure restriction to a physical place where your IT system is present. It may involve RFID door, control gates and password protected systems.

The statement is true because saving the computer and IS equipment is not the actual purpose of Physical access control. Main purpose is to ensure that system continues to run without any hiccups and that is only possible if our control address other equipment which play a pivotal role in the operation of our system e.g wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.

You might be interested in
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
adell [148]

Answer:

Punch Card Machine

Explanation:

The punch cards or the punched cards are also termed as the Hollerith cards or we also know them as the IBM cards. And they happen to be the paper cards where holes can be punched with the help of the hands or with the help of the machine for representing the computer instructions or data. And these were used on quite a large scale for inputting the data when we talk of the early computers. And this technology was developed by the Herman Hollerith.

7 0
4 years ago
Which of the following is true of lossy and lossless compression algorithms?
zysi [14]
The answer would be D.
I think I’m not totally sure:)
8 0
3 years ago
Could anyone help me with this assignment please?
kicyunya [14]

Answer:

"Word Processing Assignment

5 0
3 years ago
For smaller business and home networks, which of the following allows multiple computers to share a single broadband Internet co
olasank [31]

Answer:

cable modem

Explanation:

Just a cable modem is enough.

7 0
4 years ago
Why, y did brainly just do that........or did it just happen to me
Art [367]

Answer:

no clue but I just lost all my progress except my rank

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A search engine displays a list of webpage names that contain the search text. what is the term for that list?
    14·1 answer
  • Use-Cases are scenarios that describe
    9·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • Write a program that converts degrees Fahrenheit to Celsius using the following formula. degreesC = 5(degreesF – 32)/9 Prompt th
    6·1 answer
  • Use a logical OR to write a more concise equivalent of the following code:
    11·1 answer
  • Write a program to read a record from a binary file
    8·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • What does a converter do? A. It converts one technological system into another. B. It converts one type of electrical signal int
    10·2 answers
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Differentiate between Computer Science and Information Technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!