1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
2 years ago
8

The penalties for ignoring the requirements for protecting classified information when using social networking services are ____

_____________ when using other media and methods of dissemination.
Computers and Technology
1 answer:
Sloan [31]2 years ago
3 0

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

You might be interested in
What are the five generations of computer software​
Lerok [7]

Answer:

1st gen: Vacuum Tubes(1940–1956)

2nd gen: Transistors(1956–1963)

3rd gen: Integrated Circuits: (1964–1971)

4th gen: Microprocessors (1971–PRESENT)

5th gen: Artificial Intelligence (present)

Explanation:

8 0
2 years ago
What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
Ratling [72]
<span>Validation of electronic signatures was designed to encourage a paperless society.</span>
8 0
3 years ago
Read 2 more answers
How often do you give or receive interpersonal support through social media? Consider times when you’ve exchanged supportive mes
Naily [24]

I receive interpersonal support on almost every sight I go on: even on this one right now! An example of interpersonal support can be a typing editor, I believe.

8 0
3 years ago
What are the 3 coding languages?
zvonat [6]

Answer:

What theres a code

Explanation:

7 0
2 years ago
A restaurant owner wants to use a database to help his business. What would be a good thing for him to do first?
arsen [322]
C Ask himself what his purposes will be for using a database. You have to figure out the basics first
5 0
3 years ago
Read 2 more answers
Other questions:
  • You have been allocated a class C network address of 211.1.1.0 and are using the default subnet mask of 255.255.255.0 how many h
    14·1 answer
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • In the layers toolbar, which layer will appear in front of your game
    9·1 answer
  • List at least 5 features that can be used to format a report in word 2013
    6·1 answer
  • Divide 111001 by 1101​
    7·1 answer
  • Someone please make a random question with an easy answer because i need one more brainliest to UPGRADE!
    7·2 answers
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
  • What problems do you see in the process of transacting business online
    10·1 answer
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!