1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
3 years ago
8

The penalties for ignoring the requirements for protecting classified information when using social networking services are ____

_____________ when using other media and methods of dissemination.
Computers and Technology
1 answer:
Sloan [31]3 years ago
3 0

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

You might be interested in
Which of the following ways is NOT one of the ways that the census is
Liono4ka [1.6K]

Answer: By internet

Explanation:

5 0
3 years ago
__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
sergey [27]

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

4 0
3 years ago
What happens when the ignition is turned to accessory
ss7ja [257]
<span>It switches on the electric power for many convenience components of the car like car stereo, power windows, power seats and cigarette lighter. It depends on the car, if this position also switches on energy thirsty components like headlights, rear window defroster and air ventilator. </span>
5 0
3 years ago
A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network man
Ganezh [65]

Answer:

Network Operating System (NOS)

Explanation:

A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.

The NOS also acts as a network security because it could be used as an access control or even user authentication.

There are two types of NOS

1) Peer to peer network operating system.

2) Client/server network operating system

A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

4 0
4 years ago
Students working at individual PCs in a computer laboratory send their files to be printed by a server that spools the files on
Vanyuwa [196]

Answer:

Explanation:

Disk space is a limited resource on the spooling partition and once it is filled the will cause a deadlock. Every single block that comes into the spooling partition claims a resource, and the one behind that wants resources as well, and so on. Since the spooling space is limited and half of the jobs arrive and fill up space then no more blocks can be stored, causing a deadlock. This can be prevented allowing one job to finish and releasing the space for the next job.

5 0
3 years ago
Other questions:
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • A fitness tracker can be classified as a wearable computer. true
    9·1 answer
  • Write qbasic code for given pattern<br><br>NEPAL<br>. EPA<br>. P​
    12·1 answer
  • The main purpose of a constructor is to initialize the data members at the moment that an object is created. true or false?
    8·1 answer
  • When societies and governments make decisions, choices have to be made. Which choice is an example of opportunity cost?
    7·1 answer
  • Can you shoot video on the Olympus E-410?
    12·2 answers
  • What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?
    11·1 answer
  • Draw any five (5) basic symbols used for flowcharting
    14·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    12·1 answer
  • You have learned a lot about the types of careers that are involved with building a playground. Create two job descriptions of p
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!