1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
1 year ago
12

confidentiality ensures that only those with the rights and privileges to access information are able to do so.

Computers and Technology
1 answer:
Lapatulllka [165]1 year ago
7 0

Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

<h3>What is confidentiality?</h3>

This is known to be the act of not sharing client information with people who are known to be a third party.

Note that confidentiality is said to be very important due to the fact that the Failure to protect and secure any kind of confidential information can make or lead to the loss of business as well as clients.

It is one that can even open the door to possible  danger of confidential information being misplace, misused to commit illegal activity.

Therefore, Confidentiality ensures that only those with the rights and privileges to access information are able to do so is a True statement.

Learn more about Confidentiality  from

brainly.com/question/863709

#SPJ1

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. True or False

True

You might be interested in
All of the following can be caused by the movement of geologic plates EXCEPT
Aleks04 [339]
I think storm surges cause fro means world "earth" so a storm surge is like a flood SO plates would cause earth quakes and stuff
8 0
3 years ago
What is the working principle of computer?
ankoles [38]
The CPU is the working principle
8 0
3 years ago
Suppose we wanted to make change for purchases and wanted to use the least number of coins possible. Here is a greedy algorithm:
love history [14]

Answer:

Explanation:

The following code is a Python function that takes in the amount of change. Then it uses division and the modulo operator to calculate the number of coins that make up the changes, using the greatest coin values first.

import math

def amountOfCoins(change):

   print("Change: " + str(change))

   quarters = math.floor(change / 0.25)

   change = change % 0.25

   dimes = math.floor(change / 0.20)

   change = change % 0.20

   pennies = math.floor(change / 0.01)

   print("Quarters: " + str(quarters) + "\nDimes: " + str(dimes) + "\nPennies: " + str(pennies))

5 0
3 years ago
the header, in an academic report, typically contains the author’s name and the current page number true or false
kolbaska11 [484]
TRUE

True


In most academic reports, most specifically, an MLA academic report, Student’s last name and current page number is contained in the headers. In MLA, which is most common used formatting guide in academic reports, headers numbers all pages consecutively within the right margin.


6 0
3 years ago
Are our current copyright policies helping society or hurting society? i need help
Oksanka [162]

Answer:

helping society

Explanation:

it can help you to protect your works and creativity and brilliant ideas from liars and cheaters and frauds

5 0
3 years ago
Other questions:
  • A Python function cannot under normal circumstances reference a module variable for its value.
    12·2 answers
  • Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
    13·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • The application layer process that sends mail uses __________. When a client sends email, the client process connects with a ser
    10·1 answer
  • At Chicago Cubs games, residents across the street from Wrigley Field can watch the game from their apartment windows. Many of t
    14·1 answer
  • Keisha wants to change the default printer before printing an e-mail. Which steps will accomplish this task?
    10·1 answer
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • Which best explains a password attached to a document?
    6·2 answers
  • For this step, submit your work in the programming environment by
    12·1 answer
  • Which one is the result of the output given by a compute
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!