1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
2 years ago
5

What is the difference between cd-r, cd-rw and cd-rom​

Computers and Technology
1 answer:
insens350 [35]2 years ago
8 0

Answer:

The answer to this question is given below in this explanation section.

Explanation:

          "difference between cd-r, cd-rw and cd-rom​"

CDs are also known as WORM discs,for "write once Read many".A re writable version based on excitable crystals and known as CD-RW was introduced in the mid 1990s because both CD-R and CD-RW recorders originally required a computer to operate  they had limited acceptance of use as computer software.

  A compact Disc Read only memory (CD-ROM) is a read only disc.A compact disc Re-writable (CD-RW) is an erasable disc that can be reused.The data  on a CD-RW disc can be erased and recorded over numerous times.CD-RW may not be readable outside of the drive it was created in.

cd-r :

          CD-R is a digital optical disc storage format.A CD-R disc is compact disc that can be written once and read arbitrarily many times.

          CD-R stand for" compact disc" Record-able .CD-R disc are blank CDs that can record data written by a CD burner.The word "record-able" is used because CD-R are often used to record audio,Which can be play back by most CD players.

cd-rw:

           CD-RW compact disc re-writable is a digital optical disc,storage format introduced in 1997.A CD-RW compact disc can be written read erased and re-written.

in this case of CD-RW the writing laser makes permanent marks in a layers of dye polymer in the disc.CD rewrite-able discs in a similar fashion,except that the change to the recording surface is revers able.

cd-rom:

         CD-Rom observation of compact disc read only memory type of computer memory in the form of compact disc that is read by optical means.A CD-ROM drive uses a low power laser been encoded in the form of tiny pits on a optical disk.The "ROM" part of the term means the data on the disc "read only memory" or cannot be altered or erased.

You might be interested in
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
What five safety habits are you using for the internet?
forsale [732]

Answer: Keep Personal Information Professional and Limited.

Keep Your Privacy Settings On.

Practice Safe Browsing.

Make Sure Your Internet Connection is Secure.

Be Careful What You Download.

Choose Strong Passwords.

Explanation:that’s what is think

4 0
3 years ago
Which of the following correctly describes the reason for quality customer service?
Vera_Pavlovna [14]
The correct answer is C. Keep existing customers and clients
Explanation:
Customer service refers to the interaction with customers and support employees in a company provide to customer to guarantee he or she has the best experience when buying one product or service. A high-quality customer service implies providing complete information to customers, and helping them before, during, and even after their process in buying or looking for information in a company. The main purpose of this is that customers feel the support from employees, and are loyal to the company which means they will go back if they need the same service or products. Thus, the reason for quality customer service is "Keep existing customers and clients".
7 0
2 years ago
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing t
Free_Kalibri [48]

<u>Solution and Explanation:</u>

<u>INTRODUCTION </u>

A) Introduction Cybersecurity should be a priority for all businesses so that they can protect their information systems and data assets. Organizations all over the world have been experiencing cyber-attacks. Types of cybercrime include identity theft, ransomware, denial of service attacks, botnets, phishing and social engineering (Khanse, 2014).

Cybersecurity threats exist from both external sources and from within a company. Cybersecurity issues will have impacted businesses financially to the tune of $6 trillion dollars per year worldwide, which is double the amount since 2013. Cybercrime is projected to be more profitable than the global illegal drug trade (Morgan, 2017). CyberLeet Technologies can safeguard businesses against these threats by strictly adhering to the core tenets of cybersecurity which are confidentiality, availability and integrity. CyberLeet will ensure these tenets by identifying vulnerabilities in client systems, implementing data security policies and utilizing threat detection monitoring.

B) Your Role at CyberLeet The role of an information security analyst at CyberLeet Technologies is to enforce the cybersecurity tenets of confidentiality, integrity and availability. This will be accomplished by performing risk assessments of its client’s software, hardware and networks. The analyst must plan and implement security measures to protect client systems, networks and data. Finally, the role includes helping the client engage in security awareness training for its employees (New England College, 2017). The CyberLeet information security analyst will perform job functions which uphold the basic tenets of cybersecurity. The analyst will perform vulnerability assessments of the client systems to ensure the cybersecurity principle of availability. He or she will monitor the client network and systems to safeguard the cybersecurity tenet of confidentiality. Also, the analyst will safeguard the cybersecurity tenet of integrity by protecting client data through the use of data encryption. Other tasks that will be performed include malware analysis, enhancement of security standards, and investigation and documentation of any security breaches. The ultimate goal of an information security analyst at CyberLeet Technologies is to uphold the cybersecurity tenets of confidentiality, integrity and availability by protecting its client systems’ assets, networks and data from cyberattacks.

C) Purpose of This Manual The purpose of this manual is to train new CyberLeet information security analyst recruits about their job duties. These duties include understanding that their client’s organization is subject to information security issues and the fundamental core cybersecurity tenets of confidentiality, integrity and availability must be applied to develop security measures (Henderson, 2017). These threat mitigation security measures include the development of cybersecurity policies including password policies, acceptable use policies, employee training policies, and basic user polices. It is imperative that information security analysts apply the principles and practices outlined in this manual and provide high-quality services to the client. Failure to do so could result in the client experiencing cyber-attacks ranging from malware, phishing, denial of service and ransomware (Khanse, 2014).

CORE TENENTS OF CYBER SECURITY

A) Confidentiality One of the core tenets of cybersecurity is confidentiality. Confidentiality is the preservation of private and proprietary information, such as customer data or health records. Only authorized users should be able access protected information, while unauthorized users should be blocked. Information security requires control on access to protected information (Henderson, 2017). An example of enforcing confidentiality includes the restriction of access to company assets and information via the use authentication and authorization techniques.

B) Integrity The core tenet of integrity is the guarding against improper modification of data or system information. Data integrity is maintained when information remains unchanged during storage, transmission and usage (Henderson, 2017). An example of maintaining system integrity is the prevention of malware which can corrupt computer files. An example of maintain data integrity is the proper encryption of data prior to transmission between systems, to prevent unauthorized access and manipulation.

C) Availability The core tenet of availability is the accessibility of users to systems and data. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable (Henderson, 2017).

 

8 0
3 years ago
Businesses around the world all need access to the same data, so there
Alexxx [7]

Answer:

B

Explanation:

3 0
2 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • Write a program that will predict the size of a population of organisms. The program // should ask the user for the starting num
    6·1 answer
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • You can upgrade a cpu by adding registers and cache memory to it. <br> a. True <br> b. False
    7·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • What are the features of the Outline view in Word? Select three options.
    12·2 answers
  • If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al
    12·1 answer
  • A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
    15·1 answer
  • You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!