1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
4 years ago
8

Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr

inciples? A. Reliability, Scalability, and Portability B. Interoperability C. Security D. Resilience and Redundancy
Computers and Technology
1 answer:
Viktor [21]4 years ago
4 0

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

You might be interested in
Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT? ip
Marianna [84]

Answer:

The answer is "Option C".

Explanation:

The NAT accurately identifies the environment and internal interfaces, and main customers can link to a 192.168.1.50 Web server. When designed for, proxies examine input and output packages. IP nat "inside source" implies to encourage an outgoing parcel emanating from an "outside" application and behave accordingly.

7 0
3 years ago
One gigabyte can be expressed as: a.) 1,000 kilobytes b.) 1,000 bytes c.) 80,000 kilobytes d.) 1,000 megabytes e.) 8,000 bits
Molodets [167]
The answer is d. 1000 megabytes
8 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
goldfiish [28.3K]

Answer:

signal repeaters.

Explanation:

The best device to use in this scenario would be signal repeaters. These basically grab an already existing signal and repeats it in a specific direction therefore amplifying the range. These devices are usually used when a large network system is not reaching certain devices that are located too far away. These devices are then placed in midpoints between the network and the device and aimed towards the direction of the device. It then picks up the existing signal and retransmits it to the devices' location so that the device can pick up the network signal and access it.

6 0
3 years ago
How Java provides protection through stack inspection approach ?
Natalija [7]
Pecting Java<span> 2's </span>stack inspection<span> policy to be enforced can-. not execute on .... Figure 2. PSLang security policy that </span>allows<span> at most 10 open windows. .... </span>Method<span> call/return: A → B. At start of B, look up</span>protection<span> domain PB for B's. code and push PB on the thread-local domain-. </span>Stack<span>. At return from B (either normally or by.</span>
3 0
3 years ago
How do you render and export files on blender
Debora [2.8K]

Answer:

Save your Blender file (. blend) in the same folder as your . obj file, if you didn't already.

Click on File/External Data/Pack All into . blend.

Click on File/External Data/Unpack All Into Files.

Choose "Use files in current directory (create when necessary)"

Explanation:

<em>Hope </em><em>it </em><em>helps </em><em>ya </em><em>ItzAlex</em>

6 0
3 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • The command for creating a PivotTable is found in the <br> tab.
    7·1 answer
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • Which part of a touchscreen responds to pressure applied to its surface?
    6·1 answer
  • A string with delimiters can be parsed into separate fields using the _____ class.
    8·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • In 100 words or less, discuss why ethics is especially important for computer professionals, as it pertains to addressing profes
    5·1 answer
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
  • Select the correct answer. Who takes care of the final layout of the product that meets the standards set by UX designers? A. we
    15·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!