1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
13

Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be

shared or stored
Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

You might be interested in
Majken is turning 18 years old soon and wants to calculate how many seconds she will have been alive.
Afina-wow [57]

Answer:

I choose D :)

Explanation:

7 0
2 years ago
Characteristic of first generation computer<br>​
ella [17]

Characteristics

based on vaccum tubes

they were large,slow,low capacity

Magnetic drums for primary memory

used mll

input punched cards and output printsout

expensive

get heated faster

eg. ENIAC,UNIVAC

6 0
2 years ago
Suppose you wish to develop a matrix-multiplication algorithm that is asymptotically faster than Strassen’s algorithm. Your algo
Kazeer [188]

Answer:

The number of subproblems are given as T(n)=a*T(n/8)+\theta(n^2) while the value of T(n) to be less than S(n) is for 342.

Explanation:

The number of subproblems are given as

T(n)=a*T(n/8)+\theta(n^2)

Asymptotic running time for Strassen’s algorithm is S(n)=\theta(n^{log(7)})

Now, when a increases, number of subproblems determines the asymptotic running time of the problem and case 1 of master theorem applies. So, in worst case, asymptotic running time of the algorithm will be

T(n)=\theta(n^{logb(a)})=\theta(n^{log8(a)})=\theta(n^{log_{2}(a^{1/3})})

Now, for T(n) to be smaller than S(n)

n^{loga^{1/3}}

So,

log(a^{(1/3)})

So,

a=342

5 0
3 years ago
Which term best describes the role of a printer in a network?
const2013 [10]

Answer:

Correct answer is Shared Resource.

Explanation:

8 0
3 years ago
Read 2 more answers
Which is a subclass indicating the extent of physiological decompensation or organ system loss of function that was added to eac
stepladder [879]

The subclass indicating the extent of physiological decompensation is known to be the severity of illness.

<h3>What is psychological decompensation?</h3>

“Decompensation” is known to be a term that is often used in mental health professionals to tell about an episodes where a person's existing mental-health or psychiatric disorder is going down.

Note that The subclass indicating the extent of physiological decompensation is known to be the severity of illness.

Learn more about  physiological decompensation  from

brainly.com/question/8339958

#SPJ1

5 0
2 years ago
Other questions:
  • It is either snoming or below freezing
    10·1 answer
  • What are the 4 main types of parking
    7·1 answer
  • Mirrors on cars exist to____.
    7·2 answers
  • Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure
    8·1 answer
  • General equation: y = (89 / 27) - z * x + a / (a % 2) (recall: a is an integer; the 89 and 27 constants in the equation should b
    14·1 answer
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • What is a router?
    9·1 answer
  • Horizontal and vertical scaling usually refer to increasing the capacity of
    6·1 answer
  • How might a company gain followers on Twitter?
    7·1 answer
  • Yusuke has been a fan of online games for as long as she can remember. She particularly loves the role-playing games that allow
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!