1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
6

Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___

__ of information.
Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
5 0

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

You might be interested in
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
3 years ago
Read 2 more answers
Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
RSB [31]

Answer:

From Networkopoint of view, a node is a redistribution point or communication point or a connection point.

It can also mean devices or data points on a large network Such as laptop, phones, printers, etc

Explanation:

3 0
4 years ago
Who benefits the most from billing by the second for cloud resources, such as virtual machines?.
scoundrel [369]

Clients that run numerous virtual machines.

<h3>What is a virtual machine?</h3>
  • A virtual machine is the virtualization or emulation of a computer system in computing.
  • The functionality of a physical computer is provided by virtual machines, which are built on computer architectures.
  • Their use may necessitate specialized hardware, software, or a combination of both.
  • Virtual machines' primary function is the simultaneous operation of several operating systems on a single piece of hardware.
  • Without virtualization, running two different physical units would be necessary to run different operating systems, such as Windows and Linux.
  • Through the use of virtualization technologies, virtual machines are made possible.
  • Multiple virtual machines (VMs) can run on a single machine thanks to virtualization, which simulates virtual hardware using software.
  • The real machine is referred to as the host, and any virtual machines running on it as the guests.

To learn more about virtual machines, refer to:

brainly.com/question/27961159

#SPJ4

7 0
1 year ago
Características que debe tener un módulo o kit tecnológico para aprender​
12345 [234]

Answer:

Multi herramientas

Explanation:

Un kit tecnologico debe contener todas las herramientas necesarias para el trabajo que lo necesites, por ejemplo destornillador magnetico con varias puntas, herramientas para desmontar y por supuesto tener buena claridad para trabajar y alcohol isoprofilico de al menos 90+ para limpiar electronicos.

5 0
3 years ago
Are psn cd keys region free? If not where can I get one in my region?
Andrews [41]
This isn't school related but I'm still gonna help you so you should check the location to see if it's set to be in China if it isn't change it to China if that doesn't work I would just recommend calling customer service if you can.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which occupation requires certification by the state?
    15·2 answers
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    9·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • Please create C program, the task is to implement a function edoublepowerx that has an input parameter x of floating-point value
    11·1 answer
  • Why does my inbox keep getting notifications and then disappearing?
    15·2 answers
  • What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem usi
    14·1 answer
  • I need to reverse a inputted word using for loops with range 0 to the input word and increment 1.
    5·1 answer
  • Which statements are true? Select 4 options.
    9·1 answer
  • How can you remove background noise from a video?
    15·2 answers
  • What is the sequence of instructions performed to execute one program instruction
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!