1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
14

_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,

or computer systems.
Computers and Technology
1 answer:
Maksim231197 [3]3 years ago
4 0

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

You might be interested in
What is a office buttom?
SpyIntel [72]
The Microsoft button was exclusively used in the 2007 versions of word, excel, powerpoint, access and outlook. It has all of the different options like to save, print, open ect. It was located in the top left hand corner of the screen. It looked a bit like this (see attachment).

3 0
3 years ago
How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
marshall27 [118]
It can help you develop your leadership trait
5 0
3 years ago
Read 2 more answers
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a
irakobra [83]

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

6 0
3 years ago
Describe the object-oriented software engineering approach.
Jobisdone [24]

Answer:

 The object oriented software engineering approach is basically focus on the attention for capture the given structure and conduct the data frameworks in the form of small module which consolidates the information and the procedure.

The principle and aim of the Object Oriented Design (OOD) is that improving the quality of the system analysis and increase its productivity and more usable efficiently.

There are different phases in the object oriented software engineering approach are as follows:

  • Firstly, we start analyze and define the particular system
  • Then, construct the analysis model based on the above approach of the specific system.
  • We verify the correctness of the system by using the testing.

3 0
3 years ago
Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi
kolbaska11 [484]
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
    5·1 answer
  • Users can make notes or highlight areas of a website and then use the ________ feature of Microsoft Edge to send the highlighted
    13·1 answer
  • What is the very first thing a user usually must do to gain access to a secure computer?
    7·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
    10·1 answer
  • Which of the following is a name for the place an information services and support professional might work? software development
    15·2 answers
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
    10·1 answer
  • Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It re
    14·2 answers
  • What is it called when there are an equal number of characters on either side of the horizontal center of the page?
    8·1 answer
  • Tor F: Deleting cell data is the same as clearing the contents of a cell.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!