1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
7

The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i

n many places. Sensitive data often leaves the protection of application databases and ends up in e-mails, spreadsheets, and personal workstation files.
Computers and Technology
1 answer:
saveliy_v [14]3 years ago
8 0

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

You might be interested in
What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
juin [17]

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

  • The complex issues are simply solved.    
  • The operation of very fast recovery.  
  • The stability in condition changes.
  • Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

  • The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  
  • The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.
7 0
3 years ago
Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
Colt1911 [192]

Answer:

He should: Format the text file with comma-separated values and save as CSV file type. ]

Explanation:

hope this helps!

5 0
3 years ago
What is the difference between coding with html and coding with python
dsp73

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

5 0
3 years ago
3. When code tracing, why is it important to iteratively test parts of the program?
GenaCL600 [577]

Answer:

A. To isolate errors in the outcomes of code.

<em>Hope this helps! ^-^</em>

<em>-Isa</em>

7 0
3 years ago
. Which of the following is NOT a
joja [24]

Answer:

solution

Explanation:

The correct option is - solution

Reason -

To solve a problem,

Firstly we give input , then system will process that input which then gives output.

Solution is not a part of the process.

So, Solution is not a significant part of a simple problem.

7 0
2 years ago
Other questions:
  • What is the unique impact him professionals have on coded data?
    11·1 answer
  • The identification of critical information is a key part of the OPSEC process because: a) It is required by the JTF commander to
    13·1 answer
  • Write a sentence about a mineral you use and how you use it
    12·1 answer
  • Write the sql command to show which tutor needs to be reminded to turn in reports.
    13·1 answer
  • What are the types of hypervisiors ?
    5·2 answers
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k &lt; seq.length; k++) { if (seq[k] &gt;=
    5·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • Leon wants an output from his tablet. What should he look at?
    9·1 answer
  • which one of the following will reach every element in the array a? 1. for(int i = 0; i &lt;= a.length; i++) 2. for(int i = 0; i
    10·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!