1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
6

Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___

__ of information.
Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
5 0

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

You might be interested in
Which term means a cryptography mechanism that hides secret communications within various forms of data?.
andrezito [222]

Answer:

anything u have daling

Explanation:

6 0
2 years ago
What are the two different types of dns requests?
Fantom [35]

The two major types of DNS request are as follows;

  • Recursive Query
  • Iterative Query

<h3>What is a domain name system?</h3>

Domain name system is abbreviated as DNS.

A Domain Name System (DNS) converts domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Basically,  DNS is a directory of names that match with numbers.

Computer uses IP addresses to communicate, therefore, the DNS convert domain names to IP address for communication.  

The two major types of DNS request are as follows;

  • Recursive Query - Query that demands a resolution
  • Iterative Query - Query that does not demand a resolution.

learn more on DNS here: brainly.com/question/14397200

#SPJ11

6 0
2 years ago
Read 2 more answers
IMPORTANT HELP
balu736 [363]

Answer:

plz am so sorry I don't no it

Explanation:

Plz give me brainiest

6 0
3 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
Which of the following is used to track and gather information without knowledge or authorization?
harkovskaia [24]
It might be spyware... but i might be wrong.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Do transformers have life insurance or car insurance? If you chose life insurance, are they even alive?
    7·1 answer
  • What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space?Pace?
    11·1 answer
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • Which of the following was the name of the first generation of cell phone networks?
    14·1 answer
  • What can act as a buffer against unemployment
    11·1 answer
  • How are logical operators used?
    14·1 answer
  • What will be the value of “sumtotal” when this code is executed?
    6·1 answer
  • Why I/O modules is needed between system bus<br>and I/O devices?​
    15·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!