1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marta_Voda [28]
4 years ago
10

Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t

heft of the device.
a. True
b. False
Computers and Technology
2 answers:
Lana71 [14]4 years ago
7 0
A true because apple allows this technology on its find my iPhone as an example
NeTakaya4 years ago
3 0

The correct answer is A. True

Explanation:

In technology, remote wiping refers to a device or program that allows users to erase files or data in a computer from another device. This type of device is commonly used in an organization but also by individuals in the case the original devices are lost or stolen or in the case information need to be erased due to security. Additionally, the types of files or information that can be erased remotely depend mainly on the device used because in some cases there are restrictions to erase certain information. According to this, it is true remote wiping is a device security control that allows an organization to remotely erase data in the event of loss or theft.

You might be interested in
Help!! Best answer will get Brainliest!!
Eddi Din [679]

Answer:

answer(s):

-set goals

-select a topic

-write down research questions

Hope this helped and sorry for the bold. <3

Explanation:

6 0
3 years ago
Read 2 more answers
What is the name of the most common connector type used for providing power to various hardware components inside computer case?
user100 [1]
The answer is the molex.
4 0
4 years ago
Write down the step to search information internet​
Novosadov [1.4K]

Answer:

Here u go... hope it helps u.... have a great day ahead

5 0
3 years ago
There is a feature that allows you to lock the document, to avoid others making changes. True or False
Burka [1]

Answer:

yes there is

Explanation:

6 0
3 years ago
1. Create a function called count_to_three() , remember the colon.
Len [333]

Answer:

This program is written using Python programming language

The program doesn't make use of comments

See attachment for proper format of the program

def count_to_three():

print("One")

print("Two")

print("Three")

count_to_three()

Explanation:

The first line of the program defines the function count_to_three() with no parameters, passed to it

Line 2 to 4 of the program is indent and each line make use of print() function

Line 2 prints "One", Line 3 prints "Two" and Line 4 prints "Three" without quotes

The last line of the program calls the defined function

4 0
3 years ago
Other questions:
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • What does GPA mean? Please tell me!
    13·2 answers
  • The _________ contains approximately 200 million axons.
    13·2 answers
  • Answer the following
    11·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • Can someone help me
    8·1 answer
  • Commercial technical data and commercial software:_________.
    11·1 answer
  • Why do we use the internet so much?​
    6·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
  • after adding a sound to a slide, the audio tools tab will allow you to apply artistic effects and quick styles to your sound ico
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!