1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
9

________ can be written only once. The data cannot be erased or written over once it is saved.​

Computers and Technology
1 answer:
notka56 [123]3 years ago
6 0

Answer:

WORM (Write Once, Read Many)

Explanation:

The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.

Hence, WORM answers the question.

You might be interested in
Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
Dominik [7]

Answer:

A) A virtual image cannot be formed on a screen.

Explanation:

A virtual image cannot be formed on a screen is correct about images.

A virtual image can be viewed by the unaided eye.

A virtual image can be photographed.

Mirrors don't always produce real images.

4 0
3 years ago
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
Elza [17]

Answer: C) Man-in-the-middle

Explanation: Man-in-the-middle attack is the attack where the hacker or attacker receives and passes on communication by manipulating it between victim and entity. These two parties have the middle-man who can alter the communication secretly , without the knowledge of other parties.

The situation mentioned in the question is also similar where the   every certificate on network seems to be signed ,which was not communicated or done by the proxy server or network administrator actually.

Other options are incorrect because transitive access is misusing the access and control leading to information risk. Spoofing is disguising of hacker into reliable device for hacking information. Replay is the playing the content again in repetition.Thus , the correct option is option(C).  

 

7 0
3 years ago
. Why use a sensitivity analysis?
Natali [406]

Answer:

 Sensitivity analysis is the method in which it basically predict the final outcome of the decision. It analysis each variable individually and identify the dependency of the output value on the particular value of the input.  

The advantage of the sensitivity analysis is that it reduce the overall risk of the particular strategy and also impact of the system.

It basically work on the basic principle that firstly changed the structure and model and then observe the particular behavior of the model.

7 0
4 years ago
Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
diamong [38]

Answer:

The Email will send.

Explanation:

The email will send as long as there is internet connection.

6 0
3 years ago
A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
Oduvanchick [21]

Answer:

The method can be accessible from main method of any class.

Explanation:

Main method is the entry point of a program, which means when you start you program the first thing to execute is the main method.

public static void main(String[] args){

// Your code here

}

In the given display method you have int, double and char data types as a arguments. So in order to call display method you need to understand the datatype that you want to pass.

int only takes integers without decimal points.

double take numbers with decimal points.

and char only tak one character

so in order to call display method we need to pass those arguments in right order.

Below is the main method which will call the display method in a right way

public static void main(String[]args){

  display(25,50000.00,'T');

}

Output

The values are 25, 50000.0, and T

7 0
3 years ago
Other questions:
  • Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro
    11·1 answer
  • The most common size for a brochure is _____.
    9·1 answer
  • The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets sho
    14·1 answer
  • (count single digits) * write a program that generates 100 random integers between 0 and 9 * and displays the count for each num
    7·1 answer
  • Write a function called matches that takes two int arrays and their respective sizes, and returns the number of consecutive valu
    6·1 answer
  • 2. Why don't all buses on a motherboard operate at the same speed?​
    6·1 answer
  • Amazon Web Services and Microsoft Azure are some of the most widely used _______.
    7·1 answer
  • Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
    11·1 answer
  • What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr
    5·1 answer
  • Which network protocol is used to handle the reliable delivery of information?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!