1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?

Computers and Technology
2 answers:
nadya68 [22]3 years ago
8 0

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

vagabundo [1.1K]3 years ago
7 0

Answer:

The correct answer to the following question will be "Confidentiality".

Explanation:

Confidentiality seems to be a protection that we use to protect knowledge by restricting only permitted staff access to the device. Personnel details are private, so documents found in an individual employee folder, including SSN, compensation, health history, administrative proceedings so the justification for dismissal, can not be shared with anyone.

  • Citizens expect us to keep confidential about certain private affairs.
  • Holding the faith seems to be an essential part of confidence or belief.

You might be interested in
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
blondinia [14]
Malware is the answer

3 0
4 years ago
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
sdas [7]
Least privilege is the data access principle that ensures to unnecessary access to data exists by regulation members so that can perform only minimum data manipulation necessary. The principle of least privilege or as called as POLP is the run-through of controlling access to the minimal level that will permit normal functioning. The norm of least privilege interprets to giving people the lowermost level of user right that they can have and still do their jobs. The principle is also functional to things other than people as well as programs and processes. It is created in the US department of defense in the 1970’s and aimed to limit the potential damage of any security breach either accidental or malicious. 
5 0
3 years ago
Please help ASAP!
makkiz [27]
B. training is the correct answer
8 0
3 years ago
WILL GIVE A BRAINLIEST!!! PLS HELP!!!
DIA [1.3K]

Answer:

never gonna give you uppp

Explanation:

criiiiii

7 0
3 years ago
What are some ways to insert a row or column? Check all that apply.
kondaur [170]

Answer:

There are two ways to insert the new column or row in the table.

Explanation:

<u>Method I</u>

i. Select the cell where you want to add a new row or column,

ii. Click on Home Tab

iii. Find insert button in Cells Group.

iv. Click on Insert Row or Insert Column button.

By following above mentioned steps we can add a row or column in Excel sheet.

<u>Method II</u>

i. Select the cell where you want to add a new row or column,

ii. Right Click on the selected Cell.

iii. Find Insert Button in drop down menu and Click on Insert.

iv. There are four options in POP menu, choose Entire Row or Entire Column to insert row or column.

4 0
4 years ago
Read 2 more answers
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • . It is essential for a relay energized by alternating current to have A. many turns of small wire. B. a laminated core and a sh
    8·1 answer
  • Write a Python program that reads the CSV file, compares the population estimates of every row for 2010 and 2017 and computes th
    10·1 answer
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • Which of the following is not a key way that a LAN shares
    15·1 answer
  • What is a third variable condition that could create the following correlation?
    10·2 answers
  • What do we call data that's broken down into bits and sent through a network?
    15·1 answer
  • Who's hype for Halo Infinite?
    11·2 answers
  • You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!