1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
10

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,

that the data are used only for an authorized purpose.
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0
The correct answer is usually referred to as '<span>confidentiality'.</span>
You might be interested in
Acrynom for wys or wyg
REY [17]
What you said? And what you get?
8 0
3 years ago
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
Sati [7]

Answer: Logical Point Blocking

Explanation:

4 0
1 year ago
After purchasing new computers for her​ department, a manager is now comparing the performance of the new computers to the compu
AlladinOne [14]

Answer:

evaluation of decision effectiveness

Explanation:

Based on the information provided within the question it can be said that in this scenario she is in the stage of evaluation of decision effectiveness. This is the stage after the decision has been made in which the individual begins to analyze the decision and determine whether the decision was as effective as originally anticipated , and whether or not it was the correct decision.

8 0
3 years ago
Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
schepotkina [342]
well i dont know but i would go with b :D

4 0
3 years ago
WILL GIVE BRAINLEST!!!!!!
Nataliya [291]

Answer:

a. divide the viewfinder into three equal, vertical divisions

Explanation:.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Whats a computer scientist.
    5·2 answers
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
    15·1 answer
  • nswer the following questions concerning chapter 1:1.1 Which pair of layers are NOT peer layers?a.Transport layer in the sender
    9·1 answer
  • The word Only is absolute or qualified
    8·2 answers
  • Analyze the following code: class Test { public static void main(String[] args) { System.out.println(xMethod((double)5)); } publ
    7·1 answer
  • Someone plz answer
    8·1 answer
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • ____________ reference is used when you want to use the same calculation across multiple rows or columns.
    10·2 answers
  • PLZZZ HELP!!!!!!!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!