1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
5

Which of the constraints listed below would be considered a physical constraint

Computers and Technology
1 answer:
timurjin [86]3 years ago
8 0
Materials

materials are the only physical thing
You might be interested in
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jack
lyudmila [28]

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

<h3>What is a system hack?</h3>

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

3 0
2 years ago
What is a warm site? Multiple Choice a separate facility that does not have any computer equipment but is a place where employee
Alex777 [14]

Answer:

A SEPARATE FACILITY WITH COMPUTER EQUIPMENT THAT REQUIRES INSTALLATION AND CONFIGURATION.

Explanation:

A backup site or work area recovery site is a location where an organization can relocate following a disaster, such as fire, flood, terrorist threat or other disruptive event. There are three types: hot site, cold site and warm site.

A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.

Warm sites might have backups on hand, but they may not be complete this means that a warm site is configured with power, phone, network etc. may have servers and other resources. But a warm site is not ready for immediate switch over because it still needs to be installed and configured.

Therefore, a warm site is A SEPARATE FACILITY WITH COMPUTER EQUIPMENT THAT REQUIRES INSTALLATION AND CONFIGURATION.

8 0
4 years ago
Assume three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and J
Komok [63]

Answer:

Explanation:

Correct:

8 0
3 years ago
10 computer and operating systems errors​
babunello [35]

Answer:

what is

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • Write the header for a function addOne that accepts a single integer reference parameter and returns nothing. Name the parameter
    5·1 answer
  • Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
    9·1 answer
  • Summarize the four critical issues for cyber warfare.
    6·1 answer
  • A source is:
    15·2 answers
  • What is the difference between a debit card and<br> a smart card?
    15·1 answer
  • Core to resource management system is the _________that coordinates the server hardware.
    8·1 answer
  • Computer science is a blank process
    6·2 answers
  • What is the chip that allows the screen to work
    14·2 answers
  • Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!