1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
11

Question # 7

Computers and Technology
1 answer:
mixer [17]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
The while loop is a pre-test loop? TRUE OR FALSE
mihalych1998 [28]
True

Hope I helped! 

Let me know if you need anything else!

~ Zoe
5 0
4 years ago
Read 2 more answers
Could anyone help me with this assignment please?
kicyunya [14]

Answer:

"Word Processing Assignment

5 0
3 years ago
To apply a style to one or more elements on a web page, configure a css ________.
saul85 [17]
External style sheet

element {
background-color: #ffffff

}
5 0
3 years ago
The two fundamental approaches to moving data through a network of links and switches are
olga55 [171]

Answer:Packet and circuit switching

Explanation: Packet switching is the technique through which the data is sent from the source to destination in the form of data packets on dynamic path.It is the time of connectionless switching and route generates for each packet.

Circuit switching is the switching technique having connected path for the sending and receiving of the data.They have well defined and established path for the transmission of data.

Other options are incorrect because they define the terms that are associated with the data that gets transmitted like bandwidth,transmission rate ,packet etc. These options are not the way in which data transmitted or switched.Thus, the correct option is packet and circuit switching.

6 0
3 years ago
what are the three parts to physical security standards for various types of army equipment and the risk level
zzz [600]

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

<h3>Further explanation</h3>

Physical security is the part of security concerned with physical measures designed to protect the assets and facilities of the organization.  

The three parts to physical security standards for various types of army equipment and the risk level is access control, surveillance, and security testing.

Access control is a security technique in which regulates who/what can view/use resources in a computing environment. The example of physical access control is the locks, badge system, and security guard.

Surveillance is the condition in which the architects seek to build spaces that are more open to security personnel and authorized users. It is also the continuous monitoring of, for example, the disease occurrence. The example of surveillance is Closed-circuit television cameras (CCTV) placed in the streets.

Security testing is the evaluation and testing the information security of hardware, software, networks, and IT environment. Error handling and specific risky functionalities are examples of security testing

<h3>Learn more</h3>

1. Learn more about the security practice in electronic banking brainly.com/question/7668763

 

<h3>Answer details</h3>

Grade:  9

Subject: Computers and Technology

Chapter:  Physical security standards

Keywords:  physical security, access control, surveillance, security testing

3 0
3 years ago
Other questions:
  • The difference between the various networks is the ______ of the coverage.
    11·2 answers
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • In Java please.
    13·1 answer
  • The frequency of a sine wave is defined as:
    8·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.
    9·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • Say yes if you hate edge2021?
    8·2 answers
  • Which of the following statements are true regarding models? Select 3 options.
    10·1 answer
  • In which cipher method are values rearranged within a block to create the ciphertext?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!