1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
10

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,

that the data are used only for an authorized purpose.
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0
The correct answer is usually referred to as '<span>confidentiality'.</span>
You might be interested in
Stamps offers at-home postage and mailing for a monthly fee. Customers are able to carry a balance on their accounts that allows
alexdok [17]

Answer:

The pop-up button is necessary to show acceptance of the terms

Explanation:

5 0
3 years ago
Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
ivann1987 [24]

Answer:

C. an example of open-source software.

Explanation:

open-source software is the type of software in which anyone can access, it can also be shared And modified by anyone simply because ita accessible to the public.

Hence and open source software's source code can be

inspected, enhanced and modified by anyone. A typical example is Linux.

7 0
3 years ago
All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
horrorfan [7]

Computer Monitors are not storage devices.

3 0
3 years ago
Which programming scenario would most likely involve this array block?<br><br>SOMEONE PLEASE HELPPP​
attashe74 [19]

Answer:

answer is D

Explanation:

as the block returns the number of array members, the most likely scenario is the last one.

7 0
3 years ago
You can copy a selected shape by holding down the ____ key and then dragging the shape.
marshall27 [118]

Answer:

Option A is the correct choice answer for the above question.

Explanation:

In an MS-Powerpoint document, when a user wants to copy the selected shape and drag that shape for use in slides then he needs to--

  1. Select the shape
  2. Press the Ctrl key and
  3. drag that shape on the slide of the powerpoint.

Then the user gets the shape on the slide for their personal use.

The question scenario also suggests the same which is described above. hence Option A is the correct answer while the other is not because--

  • Option B suggests 'ESC' which is used to escape any running program.
  • Option C suggests about ALT key which is of no use for the MS-Powerpoint document.
  • Option D suggests about TAB key which is used to make the space between two texts or diagram.
5 0
3 years ago
Read 2 more answers
Other questions:
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • What file format can excel save files as
    10·1 answer
  • Look act the picture
    5·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • The Springfork Amateur Golf Club has a tournament every weekend. The club president
    7·1 answer
  • A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
    10·1 answer
  • A software process describes the interrelationship among the phases by expressing their order and frequency, but does not define
    14·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
    10·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!