1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivanshal [37]
2 years ago
12

Which technological tool is important for storing critical files?.

Computers and Technology
1 answer:
Vanyuwa [196]2 years ago
3 0

The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.

<h3>Battery backup systems</h3>

A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.

In computation, there are three major classes of batteries systems:  Lead-Acid, Nickel-Cadmium, and Lithium-Ion.

An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.

Learn more about battery backup systems here:

brainly.com/question/7125266

You might be interested in
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
4 years ago
If the catch-or-declare requirement for a checked exception is not satisfied ________. a. a stack trace will be displayed indica
irakobra [83]

Answer: I think the answer is B. the compiler will issue an error message indicating that the exception must be caught or declared.

Explanation:

7 0
3 years ago
What is the name for software designed to find and open Web documents?
Liono4ka [1.6K]
It's C.spider software purpose is to find/view web documents.
7 0
3 years ago
Write a simple BASIC program that
Jet001 [13]

Answer:

I think its B hope it helps ! Good luck

Explanation:

4 0
4 years ago
Google owns the internet backbone true or false
Deffense [45]

Answer:

False

Explanation:

They own a large chunk of it

<em>Hope this helped</em>

6 0
4 years ago
Other questions:
  • Acrynom for wys or wyg
    10·1 answer
  • Summarize the five stages of cultural shock
    11·2 answers
  • When you use the Filter feature, what appears in each column label
    11·1 answer
  • Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT
    12·1 answer
  • Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is d
    14·1 answer
  • You typed the word "weather" when you meant to type the word "whether." When will Writer or Word flag this as a misspelling or a
    6·2 answers
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • 20. When you see ##### in a cell, you should
    8·1 answer
  • What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
    6·1 answer
  • Hillary’s family is thinking of relocating to a different city to save money. They set up a budget comparing the cost of living
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!