1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
4 years ago
8

Identify the six components of an information system. Which are most directly affected by the study of computer security? Which

are most commonly associated with its study?
Computers and Technology
1 answer:
zhannawk [14.2K]4 years ago
8 0

Answer:

data

hardware

software

network

people

resources

Explanation:

The security can effect directly these components:

Data because we can store our information with some security protocol, and we can encrypt it.

Software because we can use some tools like firewalls or antivirus.

Network with this component we can prevent a lot of attacks, there is a lot of information about security network even certificates.

People we could lose data and important information if someone steals your password.

The software is most associated with my study because I like the backend and frontend in web development.

You might be interested in
You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y
larisa86 [58]

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

4 0
3 years ago
3 Points
gulaghasi [49]

Answer: Well, In my Opinion it would Be D! because these day people stick together with the internet!. If she adopt her Online business then she would be able to earn profits and also she can serve the people! Slowly people will get to know her business! That will be good for her!

<h3>I hope this works! :)</h3>

3 0
3 years ago
A household consists of a married couple and their twin five-year old daughters. The couples children had no income and lived wi
Colt1911 [192]

Answer:

APEX- 4.

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following can track your pulse and heart rate, as well as accept calls and display notifications from a smartphone?
alexgriva [62]
The answer is a smart watch most likely the apple or Samsung versions both now offer voice calls and health tracking sensors on the bottom side of the watch most popular is the apple as the company grows more everyday
8 0
3 years ago
A field value is currently not in any group. what happens when you try adding it to an existing group?
ivann1987 [24]

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

<h3>What is a  field value?</h3>

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at brainly.com/question/843074

#SPJ1

6 0
1 year ago
Other questions:
  • Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
    8·2 answers
  • When investigators find evidentiary items that aren't specified in a warrant or under probable cause what type of doctrine appli
    8·1 answer
  • A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9? A. '=A1+B2 B. '=A2+B3 C
    8·2 answers
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • Help verify each identity<br><img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bcsc%7D%7Bcot%20%5C%3A%20x%20%20%5C%3A%20%2B%20%20%5C
    9·1 answer
  • Random letter of the alphabet for Python coding
    11·2 answers
  • Which part of an I-statement involves a description of your needs or feelings? The part of an I-statement involves a description
    5·2 answers
  • Find the names of these cities with temperature and condition whose condition is neither sunny nor cloudy.
    15·1 answer
  • 1. Describe the general characteristics of a program that would exhibit very high amounts of temporal locality but very little s
    14·1 answer
  • <img src="https://tex.z-dn.net/?f=%5Cmathcal%7B%5Cfcolorbox%7Bblue%7D%7Byellow%7D%7B%5Cred%7BQUESTIONS%3A%7D%7D%7D" id="TexFormu
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!