A customer deleted all of their contacts, how can you get them back?

Answers

Answer 1
Answer:

Answer:

They are set to sync with iCloud + If they were deleted they would come back. But it also means that if you added any new contact from that period, it would be deleted. Make sure to back up your contacts next time. :)

Explanation:


Related Questions

Norman is looking into an IDS/IPS solution for his command. The network engineers recommended he select a solution that requires packets to pass in and out of the device, and that it be connected in series with the outbound traffic flow. Norman should tell the sales engineer that he is interested in a __________________ IDS/IPS solution
I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.My code:b = float(input("Enter Temperature: "))Traceback (most recent call last):File "./prog.py", line 7, inEOFError: EOF when reading a line
When computer networks are connected to each other, the system is called a(n) ____.a. internet b. LAN c. Internet d. WAN
Which of the following is not a reason for the explosive growth of the WWW? Group of answer choices Digital Darwinism Basic Web pages are easy to create and extremely flexible The microcomputer revolution made it possible for an average person to own a computer The speed, convenience, and low cost of email
Before starting a spreadsheet, it is smarter to plan ahead and think through the design. true or false

when a cloud customer uploads personally identifiable information (pii) to a cloud provider, who is ultimately responsible for the security of that pii?

Answers

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?

Answers

You are using the Rudolph rule. The Rudolph rule is just simply highlighting something for it to be noticed. In example, circling 100 data points and you have circled the highest value. The highest value is being encircled and being highlighted. The answer to your question is Rudolph rule.

Is kawahi lenord a good player

Answers

yes he is he has he is a championship, a finals MVP trophy, and a defensive player of the year award and has been voted to an all-defense team twice. 

To sort records in a query, specify the sort order in the ____ row of the design grid below the field that is the sort key.

Answers

To sort records in a query, specify the sort order in the join row of the design grid below the field that is the sort key.

Which is the last step in conducting a URL search? A. The user's browser renders the html code as a visual web page.
B. The datacenter routes the request to a destination server which hosts the website.
C. The user types a web address in his or her browser.
D. Request goes through a router or modem to the user's ISP.

Answers

i think the last step in conducting a URL search would be : A. The user's browser renders the html code as a visual web page. A web page that we commonly see is structured by a bunch of 1 and 0. Rendering process allow the machine to interpret that 1 and 0 into the visual that we currently seeing Hope this helps. Let me know if you need additional help!

User’s browser renders HTML code from destination server into web page


What means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web? A. CapacityB. Web accessibilityC. Web accessibility initiativeD. Vulnerability

Answers

Answer:

B. Web accessibility

Explanation:

Web accessibility makes sure that every person who is physically challenged or who have a visionary problem or have a hearing problem or mentally unsound ,have reading or speaking problems can still be able to use the world wide web without any obstacles or barriers.

Web accessibility makes it easier for such people to interact with the world wide web services without any stoppages even if such people are not as the normal people.