1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
2 years ago
5

The three main objectives of information security are

Computers and Technology
1 answer:
kirill115 [55]2 years ago
7 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
"Your friend is having a birthday and you want to create a slide-show presentation with pictures of her that you have saved on y
OleMash [197]
Could you be more specific? So I can help you in the best way I can.
5 0
3 years ago
“is available for...”. PLS HELP ASAP I DONT HAVE TIME
frutty [35]

Answer:

icloud for the first one

7 0
3 years ago
Indirect materials include ______. multiple choice question.
Natasha2012 [34]

Factory rent and insurance.

<h3>what is Indirect material?</h3>
  • Indirect materials are goods that, while part of the overall manufacturing process, are not integrated into the final product.
  • For example, disposable gloves, personal protective equipment, tape, etc

To learn more about it, refer

to brainly.com/question/25689052

#SPJ4

8 0
1 year ago
Outlines help you visualize the slides and the points you will include on each slide.
kvv77 [185]
I don’t know I think true
6 0
3 years ago
The clock interrupt handler on a certain computer requires 2ms (including process switching overhead) per clock tick. The clock
salantis [7]

Considering the situation described above, the fraction of the CPU execution that is devoted to handling clock interrupts "<u>12 percent</u>."

<h3>CPU Execution process.</h3>

The process of CPU Execution involves the execution of an instruction which in life fetches an instruction from memory through its ALU to carry out an operation and then saves the result to memory.

To illustrate the fraction of the CPU execution that is devoted to handling clock interrupts, we have:

60 × 2 msec = 120 msec ÷ 1 sec = 12 percent.

Hence, in this case, it is concluded that the correct answer is <u>12 percent CPU</u> devoted to the clock.

Learn more about the CPU execution here: brainly.com/question/14400616

4 0
3 years ago
Other questions:
  • How does a main program recieve info from a function in c++?
    6·1 answer
  • What is the most effective way to demonstrate being prepared for an interview?
    8·2 answers
  • What is the generic term for a mode or method of malware infection?
    8·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • What does a controller control?
    11·1 answer
  • Why is ssh preferred over telnet for remote connections?
    10·1 answer
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • Which is an example of an input device?
    6·2 answers
  • What is primary difference between the header section of a document and the body
    11·1 answer
  • 1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!