1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
5

Proper humidity and temperature for information systems equipment is an example of what type of security?

Computers and Technology
1 answer:
lidiya [134]3 years ago
3 0

Answer:

Administrative security

You might be interested in
1. row a statement you submit to get paid for a product or service 2. spreadsheet software used by many business professionals t
Ivenika [448]

Answer:

1. row a horizontal set of data in a spreadsheet  

2. spreadsheet software used by many business professionals to work with numbers  

3. data information that is stored  

4. template a file that serves as a starting point for a new document

5. function a built-in formula in a spreadsheet

6. invoice a statement you submit to get paid for a product or service

Explanation:

The correct matches have been mentioned in the answer section. Certainly, a row is the horizontal set of data is a spreadsheet. And other options are self-understood. And hence, it is self-explanatory.

6 0
3 years ago
HELP! Answer to question 2?
Vesnalui [34]
One advantage of Binary Search Algorithm: 
Compared to Linear search it is much faster because linear search starts its searching right from the first value but binary searches for something by splitting the array in two again and again and again. 

One disadvantage of Binary Search Algorithm:
Have to be sorted, unlike linear search that doesn't have to be. 
4 0
4 years ago
What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys? Multiple
frosja888 [35]

Answer: Simple-locker

Explanation:Simple-locker is the program that works on the technique in which it automatically encrypts the data or files and then demand a certain ransom or money from the user for the decryption of that data. It works on the function to gain the ransom or incentive in the financial form.

The decryption can only be carried out in safe way when the victim has the key to decrypted data or file.

5 0
4 years ago
What is the definition of shape
DerKrebs [107]

Explanation:

the external form, contours, or outline of someone or something.

8 0
3 years ago
Read 2 more answers
Code in Python
KIM [24]

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

4 0
3 years ago
Other questions:
  • The first screen you see when you open word2016 what is called?​
    5·2 answers
  • How fast can the winds blow in a tornado?
    8·2 answers
  • The methods in a subclass can use all of the data fields and methods that belong to its parent, with one exception: ____ members
    11·1 answer
  • Compare and contrast CD and DVD?
    10·2 answers
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • Look at the picture ​
    13·2 answers
  • In computer science, what is the name for a series of steps used to solve a problem?
    5·1 answer
  • What is the value of six sigma ? How dose it relate to agile management
    11·1 answer
  • What type of purchase requisition is used to turn-in a recoverable/reparable material to the ssa?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!