answersLogoWhite

0

i have the same problem it is on YouTube

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Computer Science

Briefly explain the legal regulations in relation to data protection?

The regulations in data protection affects how data is used, accessed and protected. Each organization and company has to comply with the regulations to avoid the consequences of breaching the rules.


How technological advances impact the insider threat by (Fill in the Blank). Select all that apply.?

allowing large amounts of data to be accessed


How is data from the said system accessed by other department?

Data from the system can be accessed by other departments through a secure interface or API that allows for authorized users to retrieve information as needed. Typically, access controls and permissions are implemented to ensure that only relevant personnel can view or interact with the data. Additionally, reporting tools or dashboards may be provided to facilitate data visualization and analysis without direct access to the underlying system. Regular training and documentation help ensure that all departments can effectively utilize the available data.


What is the defintion of database?

Database can be defined as an organized collection of data. I t stores a huge amount of data. The objective of database is to store whole the data at one place and can be accessed when needed.


What are 3 states of data for protection?

Three states of data are : Data at rest, Data in motion & Data in use. Data at rest: Data at rest is a term used by computer professionals to describe all data in computer storage that is not currently being accessed or transferred. Data in motion: Data in motion is data that is moving or being transferred between locations within or between computer systems. Data in use: Data in use is data that is currently being updated, processed, accessed & read by a system... Data at rest must be protected at a high level & Moving data should be closely monitored.

Related Questions

Why does Pokemon LeafGreen on nogba crash after you use a gameshark code?

Pokemon LeafGreen on No$GBA may crash after using a GameShark code due to compatibility issues between the emulator and the code itself. Some cheats can alter game data in ways that the emulator is not programmed to handle, leading to errors and crashes. Additionally, certain codes might corrupt the game's memory or exceed the limits of what the emulator can process, resulting in instability. Always ensure you're using codes known to be compatible with the emulator for a smoother experience.


How data are accessed from direct accessed storage?

the answer is you must times by five then you how who livews


Can you trade Pokémon's from the same version?

No you cant the last time i did my game data was deleted. *In an Emulator yes your game can be deleted if you are not extremely careful. However, if you have two gameboys and the cable or wifi for them. Then there is no problem ~Bambi231991~


The Data Validation dialog box is accessed from the group?

On the Data tab in the Data Tools section.


When you start Naruto ninja destiny in Nogba it says data could not be read and reinsert cartridge what should you do?

just press the x


How data is accessed from a disk that has one read?

by put it in the computer


How can a data organized be accessed and use?

Data can be accessed and used by querying the database or data storage system where it is stored. This typically involves using a programming language or tool to send requests to retrieve, manipulate, or analyze the data. Accessing data can also involve using APIs or data integration tools to connect to external data sources.


What are the three forms of locality?

Temporal locality: Refers to the idea that if a memory location is accessed, it is likely to be accessed again in the near future. Spatial locality: Indicates that if a memory location is accessed, nearby memory locations are also likely to be accessed in the near future. Data locality: Refers to the principle of keeping frequently accessed data in close physical proximity to reduce latency and improve performance.


If a data-item is declared as a protected access specifier then it can be accessed?

A class method or attribute (data item) that is declared protected can be accessed only by methods of the same class or by methods of derived classes of the class.


What does Data Accessed mean?

Data accessed refers to the act of retrieving, viewing, or using data stored in a database or other electronic storage system. This can involve running queries, performing searches, or simply viewing the content of a file or database record. Accessing data is a fundamental part of using and analyzing information in various digital platforms.


What are the strength of data base?

The following are the strengths of Database system : 1) data is secured 2) data sharing is easy 3) data can be easily accessed


What is an example of a sequentially accessed medium?

A cassette tape is an example of a sequentially accessed medium. Data on a cassette tape is stored linearly, requiring the tape to be fast-forwarded or rewound to access specific data points.