1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
2 years ago
7

Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D

oor Toward Cybersecurity. Help her complete the sentences. Organizations should avoid any data ___ while servers are transmitting information. This will help organizations keep the information intact and maintain ___.
Computers and Technology
2 answers:
Gemiola [76]2 years ago
5 0

Answer:

The answer is modification and integrity

Explanation:

Papessa [141]2 years ago
3 0

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

You might be interested in
Which process improves the life of a computer?
arlik [135]

maintenance is the answer

3 0
3 years ago
Im bored, any anime recommendations? i probably watched whatever youre gonna say
Alex777 [14]

Answer:

Hi..

Explanation:

i have seen a lot of anime shows XD hunter x hunter, dbz, black clover, 7 deadly sins

3 0
2 years ago
Read 2 more answers
Balance is the design principle that is represented when using the Crop tool?
RUDIKE [14]

Answer:

The answer is "False".

Explanation:

The rule of thirds implies to the subject, which is not centered mostly on the picture because of new photography formats their shots. Its main object is a little off with one side by using a third-party principle, which draws your attention for the audience into another design, instead of only looking at the center. In another word, we can say that this rule is used as the definition to design the Crop tool to represent as an overlay.

8 0
3 years ago
True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
Fudgin [204]

Answer: False

Explanation: Even though you can remember it is not really good because some hackers can track you passwords through those websites and could hack your account.

3 0
2 years ago
Read 2 more answers
I need help with this plz! It’s for a test and I really need help
Bas_tet [7]

Answer:

c

Explanation:

assuming you are coding in python and have not install any calculation codes, the answer is most likely c

4 0
3 years ago
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • Define a method printFeetInchShort, with int parameters numFeet and numInches, that prints using ' and " shorthand. End with a n
    7·2 answers
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • at the grocery store alexa by 1 1/3 lb of ground turkey nasha by two times as much ground turkey is alexa how much ground turkey
    9·1 answer
  • What are the benefits and risks of a client-server network?
    5·1 answer
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    8·2 answers
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • You can easily merge files even if each file contains a different record layout. Group of answer choices True False
    9·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!