1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
2 years ago
5

The three main objectives of information security are

Computers and Technology
1 answer:
kirill115 [55]2 years ago
7 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
Do all websites use the same coding to create?
Eduardwww [97]

I think not but I'm not sure

6 0
3 years ago
Who has pad let and wants to talk
vredina [299]

Answer:

I do.

Explanation:

8 0
3 years ago
Read 2 more answers
Which command is used to encrypt all passwords in a router configuration file?
Veseljchak [2.6K]

Answer:

Service Password encryption

Explanation:

It is noted that the command used on routers, to get the data of all the passwords in a router configuration file encrypted is the service password encryption.

Service password encryption solely affects plain text passwords types that includes that of the line passwords or that of the enable password. The feature uses a simple substitution method to create a "secure" non-text password displayed in the configuration.

8 0
3 years ago
Assume that name is a variable of type string that has been assigned a value . write an expression whose value is the first char
4vir4ik [10]

For the first question, you would just add the parenthesis to the string mutation1:

String word = "sadly";

String mutation1 = "(" + word + ")";

For the second you need the method substring from the String class:

It is defined as String.substring(begining, ending);

String name = "Smith";

String firstCharacter = name.substring(0, 1);

0 is considered the beginning of the string, then you get the next 1 characters.

7 0
3 years ago
A doubly linked list can be traversed in the _____ direction(s).
Trava [24]

Answer: Two direction

Explanation: Doubly linked list is a data structure which contains  node's end linked with the start of the next node and also a previous pointer .These node persist two link fields and one data field in the doubly linked list.

The transversing as well as searching  can be done in both direction. Inorder transversal (forward direction)and the reverse order (backward direction)transversal are the techniques through which the reversal is carried out in two ways.

6 0
3 years ago
Other questions:
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    5·1 answer
  • Once a business determines that change needs to occur, what ahould the
    12·1 answer
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • What pointer appears when pointing to a hyperlink
    9·2 answers
  • What commands will reset a network interface in Linux?
    13·1 answer
  • Can I recover my data from HDD if I just started formatting but did not finish it? (I ceased it!)
    7·1 answer
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • What is the square root of 1600 and 36 ?​
    6·1 answer
  • Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.
    9·1 answer
  • Why did NFL equip its players with RDIF tags?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!