1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
2 years ago
12

What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent

Computers and Technology
1 answer:
sashaice [31]2 years ago
8 0

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

You might be interested in
Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
-Dominant- [34]
The answer is hobby. He does it because he enjoys it. There is no information of him being told or paid to collect bugs, so it is a hobby.
3 0
3 years ago
Read 2 more answers
Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
koban [17]

Answer:

ISO 27002

Explanation:

The acronym ISO stand for The International Organization for Standardization. its a non governmental body that is responsible for setting standards guide internationally.

while NIST stand for National Institute of Standards and technology and it is also a body that is responsible for setting up standard guide in the US..

ISO 27002  is a standard code for implementing information security management systems. while  ISO 27017 is for cloud security.  NIST 800-12 is a general security and NIST 800-14 is for policy development. thus option A is correct.

Note :

All code preceded by ISO is from The International Organization for Standardization and are international standard. while those preceded by NIST is from National Institute of Standards and technology  and are not international standard.

7 0
3 years ago
How many bits would be used to count the students in class today?There are 10 students
Vikentia [17]

Answer:

4 bits

Explanation:

With 4 bits you can count to 15, because 2⁴=16. The maximum number you can express is always one less, i.e., 16-1=15.

In general, with n bits you can count to 2ⁿ-1.

7 0
3 years ago
Read 2 more answers
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
2 years ago
What is the value of the num_colors variable? var colors = ["red","blue","orange","yellow","green","brown","purple"]; num_colors
barxatty [35]

Answer:

Hello the options to your question is missing here are the options

  • 6
  • 7
  • 8
  • NaN

answer : 7

Explanation:

The value of the num_colors variable is 7 and this because you have to neglect the fact that there is no termination symbol at the end of the assignment operation in the code.

But when we consider the none existence of a termination symbol at the end of the assignment operation in the code, the code will generate a syntax error instead of a value.

4 0
2 years ago
Other questions:
  • Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
    15·1 answer
  • The chemical symbol H represents which of the following elements?
    9·2 answers
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • Create the Following Menu in a loop so the menu will continually show until the user chooses to exit.AddMultiplyExitAdd a value
    10·1 answer
  • You are given a class named Clock that has one int instance variable called hours.
    14·1 answer
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this qu
    14·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Perceptron simplest definition
    14·1 answer
  • Give 5 examples for software ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!