1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
14

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t

hat a system is accessible when needed defining risk associated with a subject accessing an object ensuring that a system is not changed by a subject that is not authorized to do so ensuring that the right information is seen only by subjects that are authorized to see it
Computers and Technology
1 answer:
bazaltina [42]3 years ago
4 0

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

You might be interested in
What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
lesya692 [45]

Answer:

Explanation:

ae

5 0
3 years ago
What is the Content Tab for?
anygoal [31]

Content Tabs enable Thunderbird to display remote content in a tab, which users can browse in (mostly) the same way as with a browser. For example, invoking Thunderbird's Help. What's New menu option opens a tab that displays web content.

5 0
4 years ago
Read 2 more answers
List and briefly define the four main elements of a computer.​
777dan777 [17]
-Processor(CPU)
The processor is the important element of the computer. It controls all the operations that are performed by the computer.
-Main Memory(RAM):
The main memory is referred as the primary memory. It is volatile in nature.
It stores the data and programs temporarily. It is a temporary memory.
-I/O Modules:
The I/O modules moves the data between the computer and other peripheral devices of the system.
-System Bus:
The bus that connects the CPU to main memory on the mother board, I/O modules and other components within the system.
7 0
3 years ago
which tab in the AutoCorrect dialog box enables you to specify that the corrections will automatically take place only when you
Svetllana [295]

Answer:

1. Seek for AutoCorrect from Ribbon if you do not have Classic Menu for Office

2. Resolution

Explanation:

1. Seek for AutoCorrect from Ribbon if you do not have Classic Menu for Office

Click the File tab;

Click Options button at the bottom, and you will enter Word Options window;

Click the Proofing button at left pane;

Go to the AutoCorrect Options section;

Then you will view the AutoCorrect Options… button.

2. Resolution

Open a document in Word for Mac.

On the Edit menu, click Select All.

On the Tools menu, click Language.

Select the language dictionary you want the speller to use, such as English (US).

Uncheck Do not check spelling or grammar, and then click OK.

5 0
3 years ago
Read 2 more answers
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into y
ANTONII [103]

Answer:

.c. Load them via your login script.

Explanation:

Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.

Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.

Therefore, in this case, what you can do is to "Load them via your login script."

4 0
3 years ago
Other questions:
  • When superiors providedirections to their subordinates regarding what to do, thisis
    5·1 answer
  • Insurance can help you:
    10·1 answer
  • Which course must first-time drivers in Florida take to be eligible for their Learner License?
    11·1 answer
  • What is the outside of an iPhone called?
    9·2 answers
  • List six parts of a computer system and which are output and which is an input device
    5·1 answer
  • Write a recursive method that tests whether a string is a palindrome. It should return a boolean T or F depending on whether or
    6·1 answer
  • What is output? c = 1 sum = 0 while (c < 10): c = c + 3 sum = sum + c print (sum)
    5·1 answer
  • Describe 6 difference of the types of computer<br>​
    13·1 answer
  • Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
    10·1 answer
  • HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!