Hello <span>Pouerietzach
Question: </span><span>Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
</span><span>
Answer: A, B, D, E, G
Hope That Helps
-Chris</span>
I think its physical memory but I am defiantly not confident about 90%
Answer:
Types of Protocols
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (HTTP)
Hyper Text Transfer Protocol Secure (HTTPS)
A.19.67 is a floating point number
Pull the other end of each cable through the back of the electrical box for the switch<span> that controls it, then strip the end of the cable with a knife and </span>separate<span> the </span><span>wires.
</span>