1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr

inciples? A. Reliability, Scalability, and Portability B. Interoperability C. Security D. Resilience and Redundancy
Computers and Technology
1 answer:
Viktor [21]3 years ago
4 0

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

You might be interested in
List at least 5 professions for people working in the Information/Communication<br> fields.
MrRissso [65]

Answer:

telephone servicer, mobile phone servicer, televsion servicer, computer servicer, laptop servicer

5 0
2 years ago
In Word, tables can be styled much like text can.<br> True<br> False
Delvig [45]

Answer:

True

Explanation:

There are many formatting options from color, size, and many more.

Hope this helps!

3 0
3 years ago
BUURTAIS
Alisiya [41]

Answer:

what I'm confused ???????

Explanation:

?

4 0
2 years ago
Which cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to mul
borishaifa [10]

Answer:

Resource Polling is the correct answer to the given question .

Explanation:

The Resource pooling is used in cloud computing frameworks that describe a situation where companies offer temporary and flexible resources to different clients .In the resource polling the programs can be changed to fit the needs of each client without making any adjustments visible to the client.

The main function of resource pooling that it grants a service provider the opportunity to dynamically allocate common physical resources to different clients based on the utilization criteria of each client.

5 0
2 years ago
The ___________ method returns the length of an array.
MaRussiya [10]

Answer:

A. Append

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • A marketing associate wants to use the Validate button to ensure an email is CAN-SPAM compliant. What information does the assoc
    5·2 answers
  • An
    9·1 answer
  • The
    6·2 answers
  • ______ is a type of computer software that is installed into devices such as printers, print servers, and various types of commu
    5·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • Use the drop-down menus to explain how to locate the Consolidate dialog box.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!