1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marta_Voda [28]
4 years ago
10

Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t

heft of the device.
a. True
b. False
Computers and Technology
2 answers:
Lana71 [14]4 years ago
7 0
A true because apple allows this technology on its find my iPhone as an example
NeTakaya4 years ago
3 0

The correct answer is A. True

Explanation:

In technology, remote wiping refers to a device or program that allows users to erase files or data in a computer from another device. This type of device is commonly used in an organization but also by individuals in the case the original devices are lost or stolen or in the case information need to be erased due to security. Additionally, the types of files or information that can be erased remotely depend mainly on the device used because in some cases there are restrictions to erase certain information. According to this, it is true remote wiping is a device security control that allows an organization to remotely erase data in the event of loss or theft.

You might be interested in
Electronic mail is a
skad [1K]

Answer:

A) Transmission of letter, message and memos over a communication network

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Hence, electronic mail is a transmission of letter, message and memos over a communication network. Some examples of the commonly used electronic mails platform are Yahoo, G-mail, etc.

5 0
3 years ago
Under which menu option of a word processing program does a star appear?
horrorfan [7]

<h3>UNDER THE MENU OPTION INSERT.</h3>

4 0
3 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
ryzh [129]

Answer:

The output would be "Wear short sleeves"

Explanation:

The temperature is 77.3 degrees and 77.3 > 70

3 0
3 years ago
While doing research for a newspaper article on different career salaries, Lucinda finds a broad range of salaries for nurses wh
anastassius [24]
From the given situation above, the best suggestion that can be given to Lucinda for a better research tool for her article is that, Lucinda should <span>consult .org websites, perhaps one linked with a nurses’ association, or consult a .gov website with national labor statistics on nursing salaries, both of which are more reliable. The correct answer would be the last option, option D.</span>
7 0
4 years ago
Other questions:
  • If I gain a rank and go under the points that the rank coust do I lose the rank
    8·2 answers
  • What does the KISS Principle stand for?
    11·2 answers
  • You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
    15·1 answer
  • Feature of electric circuit​
    14·2 answers
  • Write a function (funception) that takes in another function func_a and a number start and returns a function (func_b) that will
    7·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • The most efficient tables in a relational database in terms of storage space have no redundant data and very few null values bec
    13·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • In cell h13, insert a pmt function to calculate the payments for students who want to pay for their trips in three installments.
    11·1 answer
  • Which type of network cable is commonly used to connect office computers to the local network
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!