1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
14

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t

hat a system is accessible when needed defining risk associated with a subject accessing an object ensuring that a system is not changed by a subject that is not authorized to do so ensuring that the right information is seen only by subjects that are authorized to see it
Computers and Technology
1 answer:
bazaltina [42]3 years ago
4 0

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

You might be interested in
Just took a test and I got 5 wrong and I wanted to know the correct answers
baherus [9]

Answer:

I need the pic

Explanation:

7 0
3 years ago
How do i switch my level to high school on brainly
Bumek [7]

Edit your profile, click preferences, and then there should be a drop down that has your level on it which you can change.

7 0
3 years ago
Read 2 more answers
Drag each label to the correct location. Each label can be used more than once. Match the device to the port through which it co
son4ous [18]

Answer:

Mouse - USB

Monitor - display port, HDMI, and thunderbolt port

External hard drive - USB and thunderbolt port

Flash drive - USB

Explanation:

A computer mouse is an input device used to interact with a computer system. It connects with the computer through the USB port.

A Monitor is an output device that is used to display information on a computer system. It can be connected to the system through the display ports, HDMI, and the thunder port.

The External hard drive is a storage device that holds data for a long period of time. It has adapters to connect to the computer through the USB ports or thunderbolt ports. The flash drive is similar in function to the hard drive but small in size and storage space. It only connects with the computer through USB ports.

5 0
3 years ago
Intelligent automation expands on simpler forms of automation through the use of which technology?
Firlakuza [10]

Answer:

Intelligent Automation (IA) is a combination of Robotic Process Automation (RPA) and Artificial Intelligence (AI) technologies which together empower rapid end-to-end business process automation and accelerate digital transformation..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
What will be the code in CSS, to set
LUCKY_DIMON [66]

Answer:

font-family: Tahoma;

font-size: 7px;

text-decoration: underline;

Explanation:

As for the font-family, you can also specify the general font family to which the Tahoma font belongs.

4 0
3 years ago
Other questions:
  • By default, the windows desktop display
    12·1 answer
  • Describe how computer is in the last 35 years
    6·1 answer
  • Jacek has just started a new job as a sales clerk, and his first task is to create a new sales invoice. Which Microsoft software
    6·1 answer
  • According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?
    8·2 answers
  • C - Language Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. E
    12·1 answer
  • _________ is a protocol used by e-mail clients to download e-mails to your computer. (
    6·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Jared recently sent an email to all the members of his department asking them for their opinions about where the department shou
    11·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!