1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
13

According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?

Computers and Technology
2 answers:
nadya68 [22]3 years ago
8 0

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

vagabundo [1.1K]3 years ago
7 0

Answer:

The correct answer to the following question will be "Confidentiality".

Explanation:

Confidentiality seems to be a protection that we use to protect knowledge by restricting only permitted staff access to the device. Personnel details are private, so documents found in an individual employee folder, including SSN, compensation, health history, administrative proceedings so the justification for dismissal, can not be shared with anyone.

  • Citizens expect us to keep confidential about certain private affairs.
  • Holding the faith seems to be an essential part of confidence or belief.

You might be interested in
1. Ce este o baza de date? (1p)
lesya [120]

Answer:

would you mind telling me what this says im still learning my spanish

Explanation:

6 0
2 years ago
Read 2 more answers
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
Computer viruses often spread by means of what?
lozanna [386]
Email attachments hope this helps
8 0
2 years ago
Read 2 more answers
Tim is in charge of the upcoming interschool baketball tournamnent. He wants to arrange all of the teams and their members in al
Scorpion4ik [409]
C sort will be the answer
5 0
3 years ago
Janet has to create a web page for a software company that should be accessible from both desktop computers and mobile devices.
kenny6666 [7]

create a responsive website which adapts to every screen/devices. Answer is B.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
    6·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    8·1 answer
  • This formatting option functions like a space bar. However, instead of moving one space at a time, it allows you to move your te
    6·1 answer
  • What is a network of high-capacity communication links is the internet?
    8·1 answer
  • "Write a class named Car that has the following data attributes:" _ _year_model (for the car’s year model) _ _make (for the make
    12·1 answer
  • No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
    6·1 answer
  • Why has base 2 been accepted and used as the basis for computing?​
    8·1 answer
  • 13. Place where names, addresses and email information<br> is stored
    6·1 answer
  • As a student, how can you sustain focus and attention with technology distracting you from things that matter (academic, persona
    7·1 answer
  • Two friends can share 100 songs from their Bluetooth enabled mobile devices
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!