1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?

Computers and Technology
2 answers:
nadya68 [22]3 years ago
8 0

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

vagabundo [1.1K]3 years ago
7 0

Answer:

The correct answer to the following question will be "Confidentiality".

Explanation:

Confidentiality seems to be a protection that we use to protect knowledge by restricting only permitted staff access to the device. Personnel details are private, so documents found in an individual employee folder, including SSN, compensation, health history, administrative proceedings so the justification for dismissal, can not be shared with anyone.

  • Citizens expect us to keep confidential about certain private affairs.
  • Holding the faith seems to be an essential part of confidence or belief.

You might be interested in
Which of the following accessories would you use to create a drawing? A. Calculator B. Notepad C. Paint D. WordPad
Amiraneli [1.4K]
I'm pretty sure it is C. Paint. Mspaint (or Microsoft Paint), is an application used for drawing. (It can also be used for simple image editing, I use it frequently for things like cropping and clipping from an image.) 
3 0
3 years ago
Read 2 more answers
_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
andre [41]

Answer:

Host discovery

Explanation:

Hot discovery is one of the preliminary stages of network reconnaissance, it begins with different IP addresses that belongs to a particular network and adopts various methods to scan and know if a host is at the IP address. Host discovery is also known as ping scan when a sonar analogy is used.

Host discovery helps to scan the particular type of host on one's network.

5 0
3 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
Nadusha1986 [10]

Answer:

hacker can steal your data in many ways.

Explanation:

if you allow cookie site for fake websites. It can absolutely be possible.

5 0
3 years ago
Para saan po yung points dito?
PilotLPTM [1.2K]

Answer:

Hindi kudin Alam eh hahahha

7 0
3 years ago
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
Other questions:
  • Molly wants to make some cells in her balance spreadsheet different colors so that she can more quickly find important data. Wha
    13·2 answers
  • ______ means locating a file among a set of file​
    14·1 answer
  • The word computer consists of 64 bits, which is equivalent to _____ bytes.
    5·1 answer
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • Nina aspires to be a digital media specialist. What should Nana be familiar with in order to pursue this career?
    9·2 answers
  • Antivirus software uses ________ to search for known viruses.
    9·1 answer
  • What is a system unit
    7·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!