1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
8

Rachel is investigating an information security incident that took place at the high school where she works. she suspects that s

tudents may have broken into the student records system and altered their grades. if correct, which one of the tenets of information security did this attack violate? confidentiality integrity availability nonrepudiation
Social Studies
1 answer:
Scrat [10]3 years ago
3 0

I believe the answer is: Integrity

Information with high integrity tend to let any unathorized person able to alter the information within the system. Compared to other form of violation, violation of integrity had the highest chance of occurrence from direct contact with authorized personnels. (in the sample above, the personnels might the one that provide the students with the key to the computers room)

You might be interested in
Which native civilization practiced sacrificial rites that involved the removal of a living person's heart
butalik [34]

The Aztec civilization practiced sacrificial rites that involved the removal of a living person's heart

<h3>What is The Aztec ?</h3>

The Aztecs were a Mesoamerican culture that flourished in central Mexico from 1300 to 1521 during the post-classic period.

The Aztecs had many gods, but Huitzilopochtli, the god of the sun and war, was the most revered. The Aztecs believed that they lived in the fifth sun era, and that the world could end violently at any time. Human sacrifices were made in order to postpone their destruction and appease the gods.

Throughout the year, the Aztecs practiced human sacrifice. Children were sacrificed to the maize gods in February and April. Some were also drowned as a form of worship to Tlaloc, the rain god. Sacrificed people were sometimes treated as god impersonators.

To know more about The Aztec  follow the link:

brainly.com/question/19457259

#SPJ4

4 0
1 year ago
What best descibes geroge washington's main military strategy?
almond37 [142]

Answer:

I don't know

Explanation:

7 0
2 years ago
Wong is a 5-year-old boy who lives at home with his mom and dad. He has witnessed several incidents of domestic violence between
hodyreva [135]

Answer:

He thinks that hitting people and that violence is okay.

Explanation:

Children get taught everything at a young age so that they don't forget because it "sticks to them better" so they try to do their best and teach them what's proper at a young age. Wong in this case; was taught that hitting is okay and he also wants to release his anger. Since parents are role models for kids, he thinks that what he's doing is correct.

5 0
2 years ago
Read 2 more answers
Which of the below should be included in a company email privacy policy? A. Defines legitimate email users and explains what hap
Vinil7 [7]

Answer:

D. All of these are correct              

Explanation:

Option A should be included in the email privacy policy of a company.

--- The company should define the users email address authentic and not spam. The company should provides its users a legitimate email accounts and also explains the employees what happens to the email accounts once that employee leaves the company.

Option B should be included in the email privacy policy of a company.

--- Junk and spam emails are most annoying and useless emails in the corporate world. Employees should be explained not to send any junk messages using the company's email accounts. Sending spam mails are discouraged. Sending junk emails can also harm the computer and can steal important company data from the computer.

Option C should be included in the email privacy policy of a company.

--- The company should inform the email users of the organization that once an email is sent outside the organization, the organization have no control over the email sent and cannot stop neither can it change the content of the email.

Therefore the answer is ----

D. All of these are correct

3 0
3 years ago
What was the Stamp Act and what type of tax did it impose?​
ivolga24 [154]

Answer:

here is the answer:)

Explanation:

What did the Stamp Act tax?

The British needed to station a large army in North America as a consequence and on 22 March 1765 the British Parliament passed the Stamp Act, which sought to raise money to pay for this army through a tax on all legal and official papers and publications circulating in the colonies.

hope this helped.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which economic institution is also part of the legal system?
    6·2 answers
  • _____ refers to the fact that symptoms sometimes improve during treatment simply because clients often wait until symptoms are a
    14·1 answer
  • Which is a natural disadvantage Africa has, compared to most other places? O A. It is poorly located for trade. O B. Its populat
    14·2 answers
  • Which of the following mountain ranges stretches from Alabama Northeast Canada
    12·1 answer
  • Kaylee started a new job in a print shop. She worries about the different chemicals in the workplace, so she requests informatio
    6·1 answer
  • How did lava flows help from the Columbia platfau
    12·1 answer
  • Your friend Theresa is telling you a story about how she almost rear-ended another driver the night before. She said that she wa
    7·1 answer
  • A researcher has designed a study in which rats receive a pellet of food when they press a lever, but only after a set amount of
    10·1 answer
  • Please answer. I will give brainliest to whoever answers the best. It's due today.
    5·1 answer
  • What is a township in South Africa?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!