1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
13

Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be

shared or stored
Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

You might be interested in
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
Can you plz type down a word.
ivanzaharov [21]

Answer:

ok? ok? ok? ok? ok? ok? ok? ok? ok?

5 0
3 years ago
Read 2 more answers
A four-year old laptop will not boot and presents error messages on screen. You have verified with the laptop technical support
storchak [24]

Answer:

The first question you should ask yourself before performing the repair is Option B. Can you find a replacement motherboard.

Explanation:

According to me, I would ask “Can you find a replacement motherboard”.

Because, Always the laptop charge will be more than the charge of a mother board, because motherboard is just a part and the laptop consists of other important parts too. So Option (a) is not the wise selection.

Let’s look into option D. Warranty period should be verified by us and not the technical person, because we have purchased and we have the warranty card.

Let’s look into option C. The technical person will already be well-versed with fixing solution and diagnosing problem. So service manual will be of not much use to him and he would want to make money out of fixing the problem, so we cannot expect him to teach us how to replace a motherboard.

5 0
4 years ago
_______ and _____ are two major techniques involved in green computing. NextReset
FrozenT [24]
Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.


3 0
3 years ago
Read 2 more answers
When people seek information to support their point of view and discount data that do not
Julli [10]

Answer:

The correct answer to the following question will be "Confirmation".

Explanation:

It is still the method of receiving and reviewing relevant private individual contact in response to a statement for clarification on a specific product concerning claims in financial reporting.

  • A confirmation or clarification means something might be accurate. It is evidence of it or definitive confirmation of doing or about something.
  • As people try evidence to endorse their opinion and dismiss facts that do not confirm.
3 0
3 years ago
Other questions:
  • An insulated rigid tank is divided into two equal parts by a partition. Initially, one part contains 4 kg of an ideal gas at 850
    8·1 answer
  • What Windows Server 2016 feature leverages the storage contained on a network of servers and adds a new level of fault tolerance
    14·1 answer
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • You try to enter your name into a cell that accepts a numeric value. What error would you receive? A. #NAME B. #VALUE C. #REF D.
    14·2 answers
  • How can you exaggerate the height of a jump in a photograph
    10·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T5
    7·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!