1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
2 years ago
8

The penalties for ignoring the requirements for protecting classified information when using social networking services are ____

_____________ when using other media and methods of dissemination.
Computers and Technology
1 answer:
Sloan [31]2 years ago
3 0

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

You might be interested in
What is a cookie? *
creativ13 [48]

Answer:

stores the password of the user

8 0
3 years ago
Read 2 more answers
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
A unique ability of people which sets them far apart from animals is:
LuckyWell [14K]
It is observation :)
6 0
3 years ago
Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres
Likurg_2 [28]
I think that would be the (HDD) Hard Disk Drive! Hope this helps!
8 0
3 years ago
In windows, a(n) ________ follows the file name and a period and indicates the file type.
larisa [96]
Ans : Extention

In windows, a(n) extension follows the file name and a period and indicates the file type.
4 0
3 years ago
Other questions:
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • Oxygen-18 has an atomic number of 8. How many neutrons are in this isotope?
    7·1 answer
  • Organisms are classified as producers or consumers acorrding to the way they
    11·2 answers
  • Three uses for Auto Formatting in Word 2016.
    5·1 answer
  • Which of these expressions evaluates to 4.0?
    12·2 answers
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using t
    7·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • What is the fullform of ETA in computer term​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!