1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
9

What information on social networking sites could be used to discriminate against a potential employee

Computers and Technology
1 answer:
NISA [10]3 years ago
3 0

the answer on plato is b

political affiliations

You might be interested in
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
The Grow Font button appears on the ____ tab.
Leni [432]
The Grow Font button appears on the home tab.
5 0
4 years ago
In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____
Mariana [72]

<u>Answer:</u>

<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>

<u>Explanation</u>:

<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.

<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.

So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data. </em>

4 0
3 years ago
Write a Python program that accepts a year written as a four-digit Arabic (ordinary) numeral and outputs the year written in Rom
ICE Princess25 [194]
Roman numerals are V for 5, X for 10, L for 50, C for 100, D for 500, and M for 1,000.
Recall that some numbers are formed by using a kind of subtraction of one Roman “digit”; for example, IV is 4 produced as V minus I, XL is 40, CM is 900, and so on.
A few sample years: MCM is 1900, MCML is 1950, MCMLX is 1960, MCMXL is 1940, MCMLXXXIX is 1989.
(Hints: Use division and mod.)

Assume the year is between 1000 and 3000.
5 0
3 years ago
How do computers solve complex problems?
Lilit [14]

Answer:

Computers solve complex problems by coding

Explanation:

I hope this helps

8 0
3 years ago
Other questions:
  • Florida convicted __________ people of DUI in a one-year period from 2009 to 2010.
    15·1 answer
  • In 1997, two South Korean manufacturers of semiconductors, LG Semicon and Hyundai Electronics, were accused of selling dynamic r
    14·1 answer
  • A typical self-expelling fire extinguisher empties its contents in
    8·1 answer
  • Why Is Jarvis Banned For Life? Literally Don't need to be forever!
    9·1 answer
  • What is data? and types ??
    9·2 answers
  • Find two consecutive even integers such that twice the smaller is 16 more than the larger
    10·1 answer
  • Define get_date() function.
    6·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • Which one of the patterns have the highest pitch?​
    14·2 answers
  • (09 MC)How can understanding your own personality improve your relationships with others?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!