1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
2 years ago
9

A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation

al deviation b. threat c. breach d. residual risk
Computers and Technology
1 answer:
Vladimir79 [104]2 years ago
8 0

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

You might be interested in
What are different sheet icons
telo118 [61]

Answer:

There are three types of icons: “universal,” “conflicting” and unique icons.Explanation:

3 0
3 years ago
ith reference to McCall's quality modle , what are the three important aspects of a software product ?
geniusboy [140]

Answer: According to McCall's quality model , the three important factors for the aspect of a software product are:-

  • Product Revision
  • Product Operation
  • Product Transition

Explanation:

Product Revision:-these are the factors which includes the maintenance, flexibility and testing of a software .

Product Operation:-these include the factors like checking the correctness, usability, reliability, efficiency and Integrity of software to maintain its quality

Product Transition:- these are the qualities that define the portability, interoperability and whether the software can be reused or not .

7 0
4 years ago
Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
Westkost [7]

Answer:

Before running this program, make sure you have installed pandas module for python.

pip install pandas

import pandas as pd

import numpy as np

csv_file = input("Enter CSV File Name : ")

df = pd.read_csv(csv_file)

count_row = df.shape[0]

print("There were %d Film Permits in Total." %(count_row))

borough_count = df['Borough'].value_counts()

print(borough_count)

location_count = df['ParkingHeld'].value_counts().head(5)

print(location_count)

Explanation:

4 0
3 years ago
Read 2 more answers
What are the six things you will learn this week on Scratch?
notka56 [123]

Answer:

1 You can learn to draw

2 You can learn to code

3 You can learn to make a thumbnail

4 You can learn how to follow yourself

5 You can learn  to remix your own projects

6 You can learn how to make a featured project you've never shared

Explanation:

8 0
3 years ago
Who are the four main antagonists in fnaf 1
ikadub [295]

Answer:

lol it's foxy freddy bonnie and chica

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    13·1 answer
  • What is an allocation unit?
    10·1 answer
  • The width of a strand of fiber is 19.2 micrometers. if 1500 strands are adhered side by side, how wide would the resulting fabri
    9·1 answer
  • Ask me anything about grades kindergarten to fifth grade!
    12·1 answer
  • If a business filing bankruptcy has assets in the United States and one or more foreign countries, that business should file und
    6·2 answers
  • The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
    6·1 answer
  • It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive informatio
    10·2 answers
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    12·2 answers
  • B. Directions: Fill in the blanks with the correct answer.
    13·1 answer
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!