1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
1 year ago
12

confidentiality ensures that only those with the rights and privileges to access information are able to do so.

Computers and Technology
1 answer:
Lapatulllka [165]1 year ago
7 0

Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

<h3>What is confidentiality?</h3>

This is known to be the act of not sharing client information with people who are known to be a third party.

Note that confidentiality is said to be very important due to the fact that the Failure to protect and secure any kind of confidential information can make or lead to the loss of business as well as clients.

It is one that can even open the door to possible  danger of confidential information being misplace, misused to commit illegal activity.

Therefore, Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

Learn more about Confidentiality  from

brainly.com/question/863709

#SPJ1

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. True or False

True

You might be interested in
Write a for loop to populate array userGuesses with NUM GUESSES integers. Read integers using Scanner. Ex If NUM GUESSES is 3 an
inn [45]

Answer:  

import java.util.Scanner;  

public class StoreGuesses {  

  public static void main (String [] args) {  

      Scanner scnr = new Scanner(System.in);  

      final int NUM_GUESSES = 3;  

      int[] userGuesses = new int[NUM_GUESSES];  

      int i = 0;  

     

      for (i = 0; i < NUM_GUESSES; ++i){  

          userGuesses[i] = scnr.nextInt();  

      }  

      for (i = 0; i < NUM_GUESSES; ++i){  

          System.out.print(userGuesses[i] + " ");  

      }  

  }  

}  

/*

Output:

2 4 6  

2 4 6  

*/

7 0
3 years ago
Programming Exercise 11 in Chapter 8 explains how to add large integers using arrays. However, in that exercise, the program cou
Marat540 [252]

Answer:

Explanation:

The following is written in Java. It creates a class called largeIntegers that creates objects of the built-in BigInteger class to handle operations on very large numbers. The class contains the add, subtract, multiply, compare, toString methods as well as the getter and setter method for the BigInteger. A test class has been provided and the output can be seen in the attached picture below where two numbers are created and added together. Due to technical difficulties, I have added the code as a txt file below.

5 0
3 years ago
Please help me with this question<br>it on the picture​
erik [133]

Explanation:

2)computer is a general process machine ,commonly constitution for Digital circuits that accept input stores manipulated and generates output.

example of input:

monitor ,speaker,printer etc.

example of output:

keyboard,cpu,mouse etc.

3 0
3 years ago
Where is the typical location of a touchpad inside of a laptop?
Nata [24]

Answer:

Attached to the keyboard

Explanation:

I Believe This is the answer

6 0
3 years ago
When learning to code, it is helpful to take a trial and error approach to write code—write it, review messages, and write again
elena55 [62]

Answer:

Its True

Explanation:

8 0
3 years ago
Other questions:
  • #A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
    5·1 answer
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • A cell that a user is typing words or numbers into is called the ________  cell.
    15·2 answers
  • "how do we store information in long term memory?"
    12·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • User-system interaction is?
    11·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • Write a python computer program that prints out a factorial.
    12·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • What is the best definition of a network?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!