For free or for money cuz for free u would do ot on ur mp3 and money i would yse apple music
Answer:
3. Granularity
Explanation:
Granularity's concept is representing the level of how do we store the data in our database.
If the data are detailed, we can resume the data until get a granularity more strong for our analysis.
For example:
We could store data year by year of our costumers, if want to get more granularity, we could store data month by month, also we could get specific data like how often our customers visit the business or how often our customers buy in a category product.
The area that holds all the startup instructions the computer needs to start is the ROM, or read-only memory.
Answer:
True.
Explanation:
A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.
Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.
Answer:
ask customers to use strong passwords to protect their accounts