1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
15

Type the correct answer in the box. Spell all words correctly. What measures should organizations implement so that confidential

information is available only to authorized users? Organizations should implement measures so that confidential information is available only to authorized users.
Computers and Technology
1 answer:
miss Akunina [59]3 years ago
8 0

Answer:

Proper Authentication is required. Not all the people should get all the data. If this is the case then you are definitely going to find that data protection is breached. We need to define each user's role as well as privileges clearly or else we are definitely going to suffer. Always ensure proper authentication.

Explanation:

We need to define each user's roles and privileges. And that can be done through Authentication and Authorization,

You might be interested in
Which principle of design indicates that the elements that represent the same idea or category should be placed together
Allisa [31]
Fh20 is a principle in 2020
8 0
3 years ago
Read 2 more answers
Bob has 2 candy bars he is fat what hapennes
Llana [10]

Answer:

he eats The candy Bar

Explanation:

I think cause As You told he is fat He might like sugary items

3 0
3 years ago
Read 2 more answers
If you created a variable called name, what data type would that value be? Group of answer choices a float a string a Boolean an
Semenov [28]

I think its an integer

8 0
3 years ago
Read 2 more answers
__ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital
LenaWriter [7]

Answer:

Embedded Operating System

Explanation:

An embedded operating system is a specialized operating system dedicated to perform a unique task for a digital device other than your desktop or laptop. For example, we can find this operating system appears in a washing machine to enable user to control the operation of the washing machine. This type of operating system is designed to be more resource efficient. An embedded operating system can also found in cars, digital television, ATM machine, digital camera etc.

3 0
3 years ago
A product/process is referred to as a Key Technology during which of the following phases of the technology development cycle?
Galina-37 [17]
The answer is C. Mature phase.
3 0
3 years ago
Read 2 more answers
Other questions:
  • JavaScript
    10·1 answer
  • Prompt the user for an automobile service. Each service type is composed of two strings. Output the user's input. (1 pt) Ex: Ent
    9·1 answer
  • Advertising is organized around four distinct groups. The _____ group includes the photographers, the illustrators, video produc
    9·1 answer
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    15·1 answer
  • If a user inserts a piece of clip art over some text but does not want the art to block the text, the user should select
    14·2 answers
  • 6. At age 17, what was Minhaj's definition of the American Dream?
    8·1 answer
  • In relation to data science,advances in technology has made it more feasible to do what
    5·1 answer
  • Why is it easier to spot a syntax error than a logical error?​
    10·2 answers
  • Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at
    9·1 answer
  • 8.1.4: Ghost Invasion!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!