1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
10

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,

that the data are used only for an authorized purpose.
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0
The correct answer is usually referred to as '<span>confidentiality'.</span>
You might be interested in
How to make classs constructer java.
ladessa [460]

Answer:

A constructor doesn't have a return type.

The name of the constructor must be the same as the name of the class.

Unlike methods, constructors are not considered to be members of a class.  

A constructor is called when a new instance of an object is created.

Explanation:

4 0
2 years ago
Which of the following indicates the main benefit of having a larger hard drive on a computer
dem82 [27]
I would say the primary Beni fit is more space for storage , but also it does effect the speed eventually. If your hard drive is almost full, everything will be slower
8 0
3 years ago
Melissa just bought a new entertainment system for her apartment. It includes a flat-screen TV, surround-sound speakers, and a v
harkovskaia [24]

She should get personal property insurance

4 0
3 years ago
Read 2 more answers
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
3 years ago
Douglas Engelbart is credited with the invention of _____
kicyunya [14]
He created computer mouse
6 0
3 years ago
Other questions:
  • What languages do most of the students at Miami High School speak?
    6·2 answers
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • If you have configured your prompt so that it does not show your working directory, you can use the ____ command to verify in wh
    15·1 answer
  • Do You assign the Needs Met rating before assigning the page quality (PQ) rating?
    11·1 answer
  • , , ,g d,t ,dt m,dt ymtd
    9·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • How is an interpreter different from a compiler?
    9·2 answers
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • I need a computer science help.....and I rlly want it right now...this the question
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!