It should be noted that the hardware component that keeps data and information when the device is not powered is called a storage device.
This device can be permanent or temporary storage device.
<h3>What is a storage device?</h3>
Storage device can be regarded as the device that store data.
There are different storage devices for the computer system, they includes;
- Optical Storage Devices.
- External HDDs
- Random Access Memory
- Flash memory devices.
- Floppy Disks.
Learn more about storage device at ;
brainly.com/question/21283135
ANSWER:
The first row of a table is often called the header row.
~batmans wife
If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.
<h3>What is Remote entry?</h3>
An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.
Therefore, the dangers to remote access are:
- There is a risk of device loss or theft due to a lack of physical security safeguards.
- as the data is transmitted through a public internet, eavesdropping.
- unapproved access to systems or data, possibly while oblivious to the screen.
- If someone gets access to the gadget, they could watch and change the data.
Learn more about Remote access from
brainly.com/question/28900477
#SPJ1
Answer: Business intelligence system is a system that is used in the field of business and organizations for generations of the strategy and plans to make decision. This system consist of the business intelligence(BI) tools. It creates a connection in the different information/data and takes them to the business organization.
Business intelligence system has goals like:-
- Increasing daily sales
- Fast the growth rate of the business
- improving the rental performance
- Gaining more profit
There are different kinds of measures taken in security. The command should you use is Certutil.
<h3>What is
Certutil</h3>
Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.
This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.
See full question below
You need to apply security settings to the registry on a Windows server. Which command should you use?
certutil
regedit
regex
cipher
Learn more about Certutil from
brainly.com/question/24931496