1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
8

someone who protects valuable online information, like phone numbers and passwords would be considered​

Computers and Technology
1 answer:
charle [14.2K]3 years ago
6 0

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

You might be interested in
What item is at the front of the list after these statements are executed?
Veseljchak [2.6K]

Answer:

A.Sam.

Explanation:

We are using Deque interface which is sub type of  Queue interface. Deque supports insertion and deletion from both ends front and end.So it can be used as a queue and stack also.

In this question we have inserted Jack at the front first.Then Rudy at the back then larry also at the tail.Now we have added sam at the front then nothing is added to the front.So the answer is Sam.

7 0
3 years ago
true or false : The incorrect attitude towards driving is the cause of most collisions among teenage drivers.
natulia [17]
That is true your state of mind is what matters most 

4 0
3 years ago
Read 2 more answers
A1 = 10, A2 = 23. Write the formula you would use in Excel to add these two cells together. Is the formula 10 + 23? I don't know
Reptile [31]
=a1=a2 Hope this helps

6 0
3 years ago
When utilizing the Internet Storage Name Service (iSNS), how can you limit which targets iSCSI initiators can discover and conne
Sati [7]

Answer:

You can limit by devices IQN, DNS name, MAC address, IP address

Explanation:

When you configure an iSCSI target, you define which iSCSI initiators can connect to an iSNSI by the client's IQN. You can also specify which servers can connect to the iSCSI target based on MAC addresses, IP address, and DNS name.

6 0
3 years ago
Which standardized framework was developed by NIST to be used as a guidance document designed to help organizations assess and m
MariettaO [177]

The standardized framework developed by NIST to be used as a guidance document is;

NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations:

<h3>Computer Frameworks</h3>

The standardized framework by NIST from the FISMA guideline is the NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations.

Now, this standardized framework is simply a Life Cycle Approach used for Security and Privacy, and also it details the Risk Management Framework (RMF).

Read more about Computer Framework at; brainly.com/question/25236672

3 0
2 years ago
Other questions:
  • A ____________________ can be used to hierarchically represent a classification for a given set of objects or documents. A. taxo
    10·1 answer
  • Which option ensures that different parts of the document can have different page layouts? ​
    5·2 answers
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • What is a deny all catch all
    5·1 answer
  • Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to
    8·1 answer
  • For C++ ONLY please,
    14·1 answer
  • PL I BEG YOU HELP
    5·1 answer
  • Brief deacription of how hard drives have evolved
    8·1 answer
  • Which of the following is NOT a career in the Information Support and Services pathway?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!