1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
2 years ago
5

The three main objectives of information security are

Computers and Technology
1 answer:
kirill115 [55]2 years ago
7 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
On the following page, write a static method print Short Words that accepts two parameters:_____.
barxatty [35]

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

brainly.com/question/19360941

7 0
2 years ago
How desktop case or chassis designed?, material and steps?​
MariettaO [177]

They may require things such as plastic cut outs and glass depending if you want to be able to have a window to look into the pc. Some cases are 3D Printed although they have to be joined by screws at the end due to the fact that one whole print can take over a week and then it has to be well doesn't but looks better when sanded.

3 0
2 years ago
Can u please help me solve this
azamat

Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.

<h3>What are the no. of pencils?</h3>

The no. of pencils are there totally as the 11.

Read more about the basic maths:

brainly.com/question/19493296

#SPJ1

4 0
2 years ago
A student is taking a computer course in which there will be four​ tests, each worth 100 points. The student has scores of 92​,
MissTica

Answer:

He must score 86 or more in the fourth test to get and A

Explanation:

The needed score can be found with this equation

(92+88+94+x) = 360

274 + x =360

x = 360 - 274

= 86

x represents the fourth score, the sum of the four scores must be up-to 360 for the student to get an A

7 0
3 years ago
Which of the following must the designer first do in order to create the software in the following scenario? A multimedia design
Vadim26 [7]
He must explore the components of VHS films so he knows what exactly needs to be done so he software functions property.


Hope it helped,

Happy homework/ study/ exam!
8 0
4 years ago
Read 2 more answers
Other questions:
  • Which layout manager constructor call would be best-suited to create a telephone handset GUI which has three rows of three keys
    12·1 answer
  • You are designing a web application that stores static assets in an amazon simple storage service (s3) bucket. you expect this b
    12·1 answer
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • What is the key value proposition of Google Search campaigns?A. Appear as a text ad, a video ad, or a banner ad on one of Google
    13·1 answer
  • Which piston stroke of the four-stroke cycle prepares the fuel mixture for combustion??
    8·1 answer
  • Killer app is BEST described as:
    5·1 answer
  • Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus
    7·1 answer
  • What software can be used for remote operation of a sunsdr2 dx?.
    13·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!