1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
13

Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be

shared or stored
Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

You might be interested in
recursive function that accepts a stack of integers as a parameter and replaces every even value in the stack with two occurrenc
slega [8]

The solution is to keep all values in the Function Call Stack until the stack is empty. When the stack is empty, place all held items at the bottom of the stack one by one.

What is Recursive Function?

Recursive functions in code frequently rely on loop setups, in which the initial variable is called on multiple times while the loop is changing it. The factorial is a simple example of a recursive function in which an integer is multiplied by itself while being incrementally lowered. Many other self-referencing functions in a loop, for example, where n = n + 1 given an operating range, could be called recursive functions.

In addition to simpler recursive functions, programmers and others have created much more complex functions that also use recursion principles. Some, such as the Fibonacci sequence, have applications in finance and other fields, while others are esoteric and largely restricted to the IT community.

To learn more about Recursive Function, visit: brainly.com/question/28540529

#SPJ4

3 0
2 years ago
Define an iterative function named alternate_i; it is passed two linked lists (ll1 and ll2) as arguments. It returns a reference
zmey [24]

Answer:

answer is attached

5 0
4 years ago
Which is an example of a natural separation of visitors from employees?
natulia [17]

Answer:

d) desk

Explanation:

srry if this is wrong ;

4 0
3 years ago
The process of generating an image from a 2D or 3D model using computer programs is called ........
Sunny_sXe [5.5K]

Answer:

Rendering or image synthesis is the process of generating a photorealistic or non-photorealistic image from a 2D or 3D model by means of a computer program. The resulting image is referred to as the render.

Explanation:

3 0
3 years ago
Which of the following clauses will stop the loop when the value in the intPopulation variable is less than the number 5000?
garik1379 [7]

Answer:All of the above

Explanation:

4 0
1 year ago
Other questions:
  • Explain working principle of computer?​
    13·1 answer
  • Which of the following resulted in a rightward shift in supply?
    5·1 answer
  • Which of these techniques will contribute to green computing?
    10·1 answer
  • Assume that the following variables have been defined in a program: int x = 10; int y = 20; int z = 30; Write a cout statement t
    11·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • Is ROBLOX for kids?<br><br> A: Yes<br><br> B: No
    11·2 answers
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • What specific job usually includes the important pre-production step of making the
    12·1 answer
  • A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. Th
    8·1 answer
  • How do media and networks interact?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!