1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
4 years ago
13

Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents

have been forwarded via email, making the documents more difficult to track. You want to be able to prevent employees from forwarding certain emails. What should you deploy?
Computers and Technology
1 answer:
S_A_V [24]4 years ago
7 0

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

You might be interested in
BI is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies. b. BI i
torisob [31]

Answer:

architectures, tools, databases, analytical tools, applications, and methodologies

Explanation:

There are several features of business intelligence. It is a content-free expression, which means that it means different things to different people, and not same thing as suggested by Option B. While its major objective is to enable or allow easy access to data, it is not limited to data and IT only as suggested by Option C. Instead it provides managers of businesses with the ability of analysis of data. And finally it helps in the transformation of data to information and to action, which is contrary to the suggestions of Option D. Hence the first option is the only correct option.

3 0
3 years ago
Make the list of menu icon in MS Excel<br>​
valina [46]

●file

●home

●insert

●page layout

●formulas

●data

●review

●view

8 0
3 years ago
A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
bagirrra123 [75]

Answer:

Quick analysis tool.

Explanation:

Excel is a spreadsheet application package found in the Microsoft office suite. it's environment on the display screen is called a worksheet and a collection of the worksheets is called a workbook. The excel packet is used for data analysis and interpretation and presentation.

When a group of cells in a worksheet is selected, a small tool kit appears that the lower right corner, it is known as a quick analysis tool. It is use for easy and fast analysis and formatting of that selected group.

5 0
3 years ago
Read 2 more answers
A computer has __________processing device
Artist 52 [7]

Answer:

electronic processing device

4 0
3 years ago
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
Other questions:
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) _______
    10·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • What is structured​ knowledge?
    10·1 answer
  • technology might not possess emotional intelligence but it can certainly influence ours. how have technological changes affected
    7·1 answer
  • What is the major benefit Smartphones and tablet computers have had on social media?
    9·1 answer
  • You can use a(n) to call a function in response to an event?
    14·1 answer
  • What is a fire wall and how does it work
    6·1 answer
  • ....................................................................................................
    12·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!