1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
5

The conflict between the user’s goal for unfettered access to data and the security administrator’s goal to protect that data is

an issue of _________________.
A. System administration
B. Access control
C. Password protection
D. Social engineering
Computers and Technology
1 answer:
galben [10]3 years ago
7 0
B it is access control
You might be interested in
Which key doesn't relate to keyboard
igomit [66]

Answer:

Key to your heart

Explanation:

Chia Chia Chia Chia

8 0
3 years ago
Read 2 more answers
What is a device driver​
sleet_krkn [62]

Answer:

Explanation:

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer. ...

4 0
3 years ago
Read 2 more answers
Plz answer me will mark as brainliest ​
Vesnalui [34]
I’m pretty sure the answer for 1 is B.
And the answer for 2 is True.
4 0
3 years ago
Which two computer peripherals are connected to the computer through a port?
chubhunter [2.5K]
Most computer devices are connected to the computer through port
Keyboard through usb port
Printer through usb port
Hand point device through usb port
Also computer equipped with LPT port for printers and COM port for additional devices like external modems e.t.c
7 0
4 years ago
Please tell fast plzzzzzzz​
padilas [110]

Answer:

True

Explanation:

I just check on my computer

5 0
3 years ago
Read 2 more answers
Other questions:
  • Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
    12·1 answer
  • What does the KISS Principle stand for?
    11·2 answers
  • __________ is the process by which previously distinct technologies come to share tasks and resources.
    10·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • If you are involved in a collision that results in property damage, injury, or death, you must call
    13·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
    15·1 answer
  • What is the name of situation where the same data is stored unnecessarily at different places?
    15·1 answer
  • Madeleine's Instructor praised her for capturing a nearly perfect image. It included dominance, harmony, and proportion among ot
    13·1 answer
  • A malware which acts like a spy in computer system is called ___?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!