1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marta_Voda [28]
3 years ago
10

Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t

heft of the device.
a. True
b. False
Computers and Technology
2 answers:
Lana71 [14]3 years ago
7 0
A true because apple allows this technology on its find my iPhone as an example
NeTakaya3 years ago
3 0

The correct answer is A. True

Explanation:

In technology, remote wiping refers to a device or program that allows users to erase files or data in a computer from another device. This type of device is commonly used in an organization but also by individuals in the case the original devices are lost or stolen or in the case information need to be erased due to security. Additionally, the types of files or information that can be erased remotely depend mainly on the device used because in some cases there are restrictions to erase certain information. According to this, it is true remote wiping is a device security control that allows an organization to remotely erase data in the event of loss or theft.

You might be interested in
Mention five importance of taskbar​
sveticcg [70]

Answer:

The taskbar is an element of an operating system located at the bottom of the screen. It allows you to locate and launch programs through Start and the Start menu, or view any program that's currently open.

6 0
3 years ago
Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They
masya89 [10]

Answer: C. Cause and Effect Modelling.

Explanation:

Data Mining is a technique which aims at obtaining important and useful information in a stockpile of data. This in turn would prove useful in making predictions. It would also inform present decisions.

The Cause and Effect modelling approach explains that for every given action ( effect ), there was a prompting factor ( cause ).

In the case of Sendstars Company, the downward spiral in customer retention was as a result of ill -mannered staff. This effect, prompted the decision to have the employees trained on customer service.

3 0
3 years ago
Read 2 more answers
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell r
timama [110]

The equations that uses addition, subtraction, multiplication and division operators and other values in a spread sheet is known as formulas. They are a way of having to provide symbols in means of expressing information regarding a mathematical formula that are being solved or showing its solution along with it.

4 0
3 years ago
First, define an integer variable and assign it any value of your choice. Then you'll need to perform the following operations w
Tcecarenko [31]
Python code:

x=121
x += 9
x *= 2
x -= 4
x >>= 2
x -= 121
7 0
3 years ago
What protocol is used to access directory listings within active directory or other directory services?
zalisa [80]

The LDAP protocol is used to access directory listings within active directory or other directory services.

LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.


3 0
3 years ago
Other questions:
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • Which of the following will increase the level of security for personal information on a mobile device if the device is lost or
    7·2 answers
  • list three quantitative characteristic properties of water explain why they are considered characteristic
    5·1 answer
  • define a computer, state its 3 main activities with examples of the functions of each of those activities​
    7·1 answer
  • Match the following
    13·1 answer
  • The full meaning of UNIVAC and ENIAC​
    5·2 answers
  • Which one do we use to send signals as IR light waves?
    11·1 answer
  • What is best defined as a phishing email that is targeted directly at you?.
    14·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!