1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
7

The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i

n many places. Sensitive data often leaves the protection of application databases and ends up in e-mails, spreadsheets, and personal workstation files.
Computers and Technology
1 answer:
saveliy_v [14]3 years ago
8 0

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

You might be interested in
What ip address cidrs are not allowed to be communicated with by our malware?
dalvyx [7]

For this project an analysis tool must be used that will do the analysis for you. Following the provided set of access rules -A FORWARD -s 192.168.56.0/24 -d 130.207.0.0/16 -j DROP above rule will drop every packet from the source IP range (192.168.56.0 to 192.168.56.255) and having destination IP range (130.207.0.0 to 130.207.255.254).

4 0
3 years ago
The spellchecker can be found in which two locations in most wordprocessing software?
bogdanovich [222]
Editing tab or in the same section as the find comand
8 0
4 years ago
The maximum-valued element of an integer-valued array can be recursively calculated as follows: If the array has a single elemen
Tasya [4]

Solution :

#include <iostream>

using namespace std;

//Function Declaration

int max(int arr[],int size);

int main()

{

//Declaring variable

int size;

 

while(true)

{

cout<<"Enter the no of elements in the array :";

cin>>size;

if(size<=0)

{

  cout<<"Invalid.Must be greaterthan Zero"<<endl;

  continue;

  }

  else

  break;

  }

 

//Creating an array

int arr[size];

/* getting the inputs entered by

* the user and populate them into array

*/

for(int i=0;i<size;i++)

{

cout<<"Enter element#"<<i+1<<":";

cin>>arr[i];

}

//calling function

int maximum=max(arr,size);

//Displaying the output

cout<<"The maximum Element in the Array is :"<<maximum<<endl;

return 0;

}

/* Function implementation which finds

* the maximum element in the array and return it

*/

int max(int arr[],int size)

{

//Declaring the static variables

static int k=0,maximum=-999;

 

/* This if block will execute only if the value of k

* is less than the size of an array

*/

if(k==size-1)

{

   return arr[0];

  }

else if(size-1>k)

{

if(arr[k]>maximum)

maximum=arr[k];

 

//Incrementing the k value

k++;

 

//Calling the function

max(arr,size);

}

return maximum;

}

4 0
3 years ago
Convert (0.255)¹⁰ into binary<br>​
nasty-shy [4]

0.01000001010001111011

Must click thanks and mark brainliest

3 0
3 years ago
Given integer variables totalTickets, vipTickets, and sessionNum, which line of code correctly calls the following function? voi
alekssr [168]

Given integer variables <em>'totalTickets, vipTickets, and sessionNum'</em>, the line of code given in option C correctly calls the following function: "<em>void FinalTally(int* totalAttendees, int* vipAttendees, int numSessions);</em>"

The correct function call with the variables named <em>'totalTickets, vipTickets, and sessionNum</em>' is as follows:

<em>FinalTally(&totalTickets, &vipTickets, sessionNum); </em>

A function call refers to an expression that passes control and arguments (if there are any) to the specified function and has the syntax as <em>FunctionName (argumentList</em>) where <em>FunctionName is the name of the function to be called and argumentList indicates the list of arguments (separated by commas) to be passed to the calling function</em>.

"

<u><em>Correct question is as follows:</em></u>

Given integer variables totalTickets, vipTickets, and sessionNum, which line of code correctly calls the following function? void FinalTally(int* totalAttendees, int* vipAttendees, int numSessions);

a. FinalTally(totalTickets, vipTickets, &amp;session Num);

b. FinalTally(&amp;totalTickets, &amp;vipTickets, session Num);

c. FinalTally(&totalTickets, &vipTickets, sessionNum);

d. FinalTally(&amp;totalTickets, &amp;vipTickets, &amp;session Num);

"

You can leran more about Function Call at

brainly.com/question/28566783

#SPJ4

3 0
1 year ago
Other questions:
  • Match each of the following terms to its function:_________
    13·1 answer
  • Assume you have functions f and g such that f(n) is O(g(n)). For each of the following statements, decide whether you think it i
    12·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • The CPU converts into information. The CPU is the mastermind of the computer, controlling everything that goes on through a seri
    12·2 answers
  • 4. Explain the term prejudice. What is an example of prejudice as it relates to parenting?
    11·1 answer
  • How do you navigate multiple computer screen at one time?
    5·1 answer
  • The Publisher-Subscriber design pattern is used to create __________________ communication between software objects and is used
    13·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • The USGS and National Weather Service have many sensors collecting data about natural events.
    8·2 answers
  • The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!