1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
4 years ago
13

Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents

have been forwarded via email, making the documents more difficult to track. You want to be able to prevent employees from forwarding certain emails. What should you deploy?
Computers and Technology
1 answer:
S_A_V [24]4 years ago
7 0

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

You might be interested in
Which part holds the "brains" of the computer?
NeTakaya

The central processing unit or CPU

Explanation:

A CPU is a chip containing millions of tiny transistors

5 0
3 years ago
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
Ratling [72]

Answer:

Option c (byte alignment) is the appropriate alternative.

Explanation:

  • This same alignment problem emerges if another architecture does seem to be an application-specific byte, however, the design phrase set education seems to be greater within one byte. In these kinds of case scenarios, because when recovering a significance from people's memories the structure can come back less than half including its bits.
  • If memory access isn't synchronized, it seems to have been unevenly spaced. Recognize that even by interpretation, byte storage access has always been connected.

Some other choices aren't connected to the type of situation in question. So the above is the right option.

4 0
3 years ago
How old was the mummy where they found a wooden prosthetic toe on him?
White raven [17]

Answer:

950 Bc and 710 bc

Explanation:

They could of course have remained bare foot or perhaps have worn some sort of sock or boot over the false toe, but our research suggests that wearing these false toes made walking in a sandal more comfortable," she continued. The wood and leather toe was made for a woman that likely lived between 950 BC and 710 BC.Oct 2,

6 0
3 years ago
When you open a new web browser window, you can customize its appearance using the ____ argument of the window.open() method.
goldenfox [79]

Answer:

"options" are the correct answer to the following question.

Explanation:

window.open() function is the function of the javascript which is used by the programmer inside the program, this method opens the new tab or the browser window which depends on the browser setting or the argument of the window.open() function.

In the parameter of this method, we pass the URL, window's name, or the comma separators, or replace current entries.

4 0
3 years ago
BIm computer class I need answers please
egoroff_w [7]

Answer:

I think the 3RD

Explanation:

The  reason why I think that is because the other once are not written correctly.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    12·1 answer
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    13·2 answers
  • 1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
    6·1 answer
  • What two different types of encryption can be used by ipsec during data transfer?​?
    5·1 answer
  • Now, Kim wants to add the technical terms she typically misspells to the PowerPoint built-in list. Which option should she use t
    15·2 answers
  • While editing a film, a director feels that the actors have not enacted a particular scene well. What type of shot must the dire
    12·1 answer
  • Do you need special software to create a web page?
    6·2 answers
  • The greater the profit motive in an economic system , the greater the likelihood of a.Innovation b.Equity c.Security d.Governmen
    15·1 answer
  • CHALLENGE ACTIVITY
    6·1 answer
  • 3.There are 3 arrays that hold related data at each position (parallel). The first array holds product codes. The second holds t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!