1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

The three main objectives of information security are.

Computers and Technology
1 answer:
kotykmax [81]2 years ago
8 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
VashaNatasha [74]

Answer:

B. Operational-level systems monitor the elementary activities and transactions of the organization.

6 0
2 years ago
What would be the most efficient way for the chain's
Aleks [24]

Answer: The answer is D)

Explanation:

Just got it correct!

8 0
4 years ago
You've found an image you want to insert into your slide presentation. You
user100 [1]
You would need to adjust the hue
5 0
4 years ago
Read 2 more answers
What does the Control Panel's Display icon allow you to do?
UNO [17]

Answer: To have access to all the hardware and software settings in your computer system.

Explanation:

4 0
3 years ago
What is the definition of Microsoft Operating System?<br>​
MaRussiya [10]

Answer:

Operating system designed and produced by Microsoft Corporation. Similar to other operating systems, Windows makes a computer system user-friendly by providing a graphical display and organizing information so that it can be easily accessed.

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technicia
    9·1 answer
  • I have one big question <br><br><br> WHAT CAN I DO WHEN I'M BORED
    6·2 answers
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • Why does this say I'm in middle school?
    11·1 answer
  • Create a variable ‘temp’ and assign the value in Celsius. Display the message ‘It’s extremely hot day today!’ if the temperature
    8·1 answer
  • Modify the Eggs program to create a new one named EggsInteractive that prompts the user for and accepts a number of eggs for eac
    13·1 answer
  • The presentation ____ determines the formatting characteristics of fonts and colors.
    8·1 answer
  • Who when and why developed python​
    9·2 answers
  • 3. List three common vector image file types.
    7·1 answer
  • This activity involves the final processing and complete sterilization of the process finish product
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!