1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
10

which virtue you need to secure information by limiting computer access to authorized personnel only?

Computers and Technology
1 answer:
Pavel [41]3 years ago
4 0
<span>Which virtue do you need to secure information by limiting computer access to authorized personnel only? The Answer is </span>Confidentiality
You might be interested in
A _____ are devices that permit a user to connect to a digital t-carrier service.
Hunter-Best [27]
CSU/DSU ( channel service unit / data service unit ) It is a digital-interface device used to connect DTE
3 0
3 years ago
Write a Tip Calculator in code in VMware Fusion
lisabon 2012 [21]

final \: amount \times percent \: of \: tip = tip \: amount
7 0
3 years ago
A security administrator is required to submit a new csr to a ca. what is the first step?
m_a_m_a [10]
If an administrator needs to renew a certificate for a web server he/she should submit the CSR (Certificate Signing Request) to CA.
<span>If a security administrator is required to submit a new CSR to a CA, teh fisrt step the administrator should do is to g</span>enerate a new private key based on RSA.
4 0
3 years ago
What type of encryption is this "1d83ad29cf19ff399445aff3a0da74d9"
bija089 [108]

Due to the length of the hash I'm going to say it's MD5

7 0
3 years ago
Who developed the idea of a universal network?
polet [3.4K]
Alan Turing fathered the machines we now lovingly call computers, however it was Nicola Tesla that birthed the idea of a world-wide wireless system.
7 0
4 years ago
Other questions:
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • Which of these options would likely have a better playback experience in your presentation?
    8·2 answers
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • When preparing a document flowchart, the names of organizational departments or job functions should appear in theA) column head
    6·1 answer
  • Businesses use spreadsheets to keep track of financial________.
    14·1 answer
  • When was internet started in which year​
    13·2 answers
  • ​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted
    8·1 answer
  • Mention the generation we have in computer​
    7·1 answer
  • Which of the following is NOT one of the four benefits of using email?
    14·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!