1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
6

I) State the two types of storage media.

Computers and Technology
2 answers:
Free_Kalibri [48]3 years ago
5 0
Under what circumstances may a health insurer charge a higher premium to a woman with a genetic disposition to breast cancer? a) Her mother has breast cancer but she doesn't. O b) She has breast cancer. c) Her sister has breast cancer but she doesn't. d) Health insurers can never discriminate based on genetic information in this way.
Burka [1]3 years ago
3 0
1- primary storage and secondary storage
2-volatility, mutability and accessibility
3 encrypt your data and backup your data on another device
You might be interested in
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
Which type of footwear should be worn while working on a hybrid vehicle?
Dmitrij [34]

Hello there!

Shoes with rubber souls would be the best bet.

7 0
3 years ago
Read 2 more answers
A ________ in a spreadsheet is a predefined operation. *
anyanavicka [17]
A ________ in a spreadsheet is a predefined operation.
Function
4 0
4 years ago
A member of the human resources department received the following email message after sending an email containing benefit and ta
mihalych1998 [28]

Answer:

a. The DLP system flagged the message.

Explanation:

Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.

8 0
4 years ago
the entity book includes paperback, hardcover, and digital books. the attribute chaptercount applies to both paperback and hardc
erastova [34]

The entity book is available in paperback, hardcover, and digital formats. The attribute chapter count applies to both paperback and hardcover editions, but not to digital editions. Text to speech is a characteristic of digital. The entity type's subtype is digital.

What is entity?

An entity is something that existing as itself, as a subject or as an object, in the present or in the future, concretely or abstractly, physically or not. Abstractions and legal fictions, in particular, are commonly viewed as entities. There is no presumption that an entity is animate or existing in general. Animals, natural features such as mountains, inanimate items such as tables, numbers or sets of symbols written on paper, human inventions such as laws, businesses, and academic fields, and supernatural beings such as gods and spirits are all covered by the phrase.

To learn more about entity
brainly.com/question/13437795

#SPJ4

4 0
2 years ago
Other questions:
  • What does the Sort feature do with a database
    13·1 answer
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the
    13·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • What is the name of a button on a website?
    11·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • Se numeşte permutare a unei mulţimi finite orice rearanjare a tuturor elementelor acelei mulţimi.
    14·1 answer
  • You are writing a program to help compare two sports teams. A sample member of the list scores is [2. 5] where your team scored
    5·2 answers
  • What are the 7 c s of communication​
    9·1 answer
  • What is the relationship between interrupt and buffer <br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!