1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?

Computers and Technology
2 answers:
nadya68 [22]3 years ago
8 0

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

vagabundo [1.1K]3 years ago
7 0

Answer:

The correct answer to the following question will be "Confidentiality".

Explanation:

Confidentiality seems to be a protection that we use to protect knowledge by restricting only permitted staff access to the device. Personnel details are private, so documents found in an individual employee folder, including SSN, compensation, health history, administrative proceedings so the justification for dismissal, can not be shared with anyone.

  • Citizens expect us to keep confidential about certain private affairs.
  • Holding the faith seems to be an essential part of confidence or belief.

You might be interested in
Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), mod
Fiesta28 [93]

Answer:

Explanation:

This code was written in Java. It creates the Cars class with the requested variables and methods. It also creates the TestCars class which asks the user for the necessary inputs and then creates three Cars objects and passes the input values to the constructors. Finally, it uses the show() method on each object to call the information. A test has been created and the output can be seen in the attached image below.

import java.util.Scanner;

class TestCars{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter Car Make: ");

       String make1 = in.next();

       System.out.print("Enter Car Model: ");

       String model1 = in.next();

       System.out.print("Enter Car Year: ");

       int year1 = in.nextInt();

       System.out.print("Enter Car Make: ");

       String make2 = in.next();

       System.out.print("Enter Car Model: ");

       String model2 = in.next();

       System.out.print("Enter Car Year: ");

       int year2 = in.nextInt();

       System.out.print("Enter Car Make: ");

       String make3 = in.next();

       System.out.print("Enter Car Model: ");

       String model3 = in.next();

       System.out.print("Enter Car Year: ");

       int year3 = in.nextInt();

       Cars car1 = new Cars(make1, model1, year1);

       Cars car2 = new Cars(make2, model2, year2);

       Cars car3 = new Cars(make3, model3, year3);

       car1.show();

       car2.show();

       car3.show();

   }

}

class Cars {

   String makes, models;

   int years;

   public Cars(String makes, String models, int years) {

       this.makes = makes;

       this.models = models;

       this.years = years;

   }

   public void show() {

       System.out.println("Car's make: " + this.makes);

       System.out.println("Car's model: " + this.models);

       System.out.println("Car's year: " + this.years);

   }

}

5 0
3 years ago
In the broadest of terms, the performance management process features a cycle that begins with ________________ and concludes wi
Flauer [41]

In the broadest of terms, the performance management process features a cycle that starts with Prerequisites and concludes with performance Review.

<h3>What is performance management process?</h3>

Performance management exists as a communication procedure by which managers and employees work together to plan, monitor, and review an employee's work goals and overall contribution to the organization. Effective performance management exists important to businesses. Through both formal and informal processes, it allows them to align their employees, resources, and systems to complete their strategic objectives.

<h3> Steps of the performance process</h3>
  • Step 1: Create a Performance Management Plan. Create the plan as described as possible, avoiding the usage of ambiguous language.
  • Step 2: Set Goals for Performance Management.
  • Step 3: Complete a Performance Review System.
  • Step 4: Create Strong Feedback-Giving Skills.
  • Step 5: Ongoing Employee Performance Management.

Hence, In the broadest of terms, the performance management process features a cycle that starts with Prerequisites and concludes with performance Review.

To learn more about performance management process refer to:

brainly.com/question/14506325

#SPJ4

3 0
2 years ago
The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data
blagie [28]

Answer:

C.<em> improve data quality and reduce redundancies, reduce increased and staggering storage management costs</em>

<em></em>

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

6 0
4 years ago
Practice using word processing software, including creating, formatting, and saving a document.
irakobra [83]

When writing the cover letter, the following points are important:

  • Keep it short.
  • Proofread.
  • Avoid cliches.
  • Be creative.

<h3>What is a cover letter?</h3>

A cover letter simply means a document that's written alongside a CV when an individual applies for jobs.

The cover letter should be addressed to a specific person and should describe one's accomplishments and achievements.

Learn more about cover letters on:

brainly.com/question/3602860

6 0
3 years ago
An attacker on the network intends to overwhelm another computer with icmp packets as follows:
Blizzard [7]
And, the simple answer is to disable ICMP echo requests on either the router or Workstation.
4 0
3 years ago
Other questions:
  • Brian wants to conduct an online search using a certain phrase he intends to use the word books that belong to the 1800's in his
    8·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an un
    10·1 answer
  • Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
    13·2 answers
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • Illusions in physcology​
    14·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • What is the fullform of ETA in computer term​
    15·1 answer
  • Please i relly need this! ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!