1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
3 years ago
12

Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of

these would be considered a technical safeguard? Legal-regulatory requirements. Locked doors and other physical barriers. Policies about who is granted access to what types of data. Measures including device data encryption, anti-malware software, and communications encryption.
Computers and Technology
1 answer:
attashe74 [19]3 years ago
6 0

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

You might be interested in
What is the binary number for 5?
Softa [21]

Answer:

the binary code for "5" is 00000101

8 0
2 years ago
Is there a link between the fields of multimedia and animation?
PtichkaEL [24]
They're (Almost) the same thing, Silly!
4 0
2 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Federal law requires safety training before workers or students enter the work area.
otez555 [7]

It is True.

According to federal laws in the U.S, an employer is required by law to provide training to all employees. The employees should acquire this knowledge and understanding and any skills necessary for the performance of the duties. The employer is also required to certify that the training has been accomplished.


8 0
3 years ago
After updating business information, what's next to click?
Shtirlitz [24]

Answer:

B. i think????!!

Explanation:

i answer that.

8 0
2 years ago
Other questions:
  • Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
    11·1 answer
  • Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to
    10·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • What is meant by algorithm?​
    12·1 answer
  • For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
    5·2 answers
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
  • Translate the following pseudocode for randomly permuting the characters in a string into a C++ program.
    15·1 answer
  • Write a program. in QBAsSIC
    13·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • _____ allows information to be viewed at a glance without needing to address the individual elements of the information separate
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!