1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
7

Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D

oor Toward Cybersecurity. Help her complete the sentences. Organizations should avoid any data ___ while servers are transmitting information. This will help organizations keep the information intact and maintain ___.
Computers and Technology
2 answers:
Gemiola [76]3 years ago
5 0

Answer:

The answer is modification and integrity

Explanation:

Papessa [141]3 years ago
3 0

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

You might be interested in
Hi Lesiana, After your presentation last week, the manager thinks an in-house solution is the way to go. Although our programmer
zlopas [31]

The Hierarchical drawing of the In- House solutions includes Four categories such as product, service, training, support and about.

<h3>What is Hierarchical drawing?</h3>

Hierarchical drawing is also known as Layered Graph Drawing which includes the drawing in the vertices and are made on the Horizontal rows and layers.

The complete solution is attached below.

The In-House solutions' hierarchical diagram covers four categories, including product, service, training, support, and about.

Learn more about Hierarchical drawing here:

brainly.com/question/26031625

#SPJ1

 

3 0
2 years ago
I need help with my homework
lukranit [14]

Answer:

C is not equal to the other two.

Explanation:

A = 35

B = 35

C is actually equal to 36.

8 0
2 years ago
Which of the following is NOT a font style?<br> Italic<br> Bold<br> Regular<br> Iconic
madam [21]

Answer:

iconic

Explanation:

iconic iconic iconic

8 0
3 years ago
Read 2 more answers
How you will install an operating system on your computer
defon
Someone can install an operating system by disk or removable storage media.

Disk being floppy, tape or commonly a DVD.

Removable storage being a USBdrive.
5 0
3 years ago
A computer program is tested by 5 independent tests. If there is an error, these tests will discover it with probabilities 0.1,
Svetllana [295]

Answer:

0.8488

Explanation:

Let E =error found by test 1

Let F=error found by test 2

Let G=error found by test 3

Let H=error found by test 4

Let I= error found by test 5

Given P(E)=0.1, P(F)=0.2, P(G)=0.3, P (H)= 0.4, P (I)=0.5

therefore P(notE)=0.9, P(notF)=0.8, P(notG)=0.7, P(not H)=0.6, P (notI)=0.5

Tests are independent P(not E & not F &not G & not H & not I=P(notE)*P(notF)*P(notG)*P (notH)*P (not I) =0.9*0.8*0.7*0.6*0.5 =0.1512

P(found by at least one test)= 1- P(not found by any test)=1-P(not E& not F & not G & not H & not I ) = 1-0.1512 = 0.8488

5 0
3 years ago
Other questions:
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
    10·1 answer
  • Write four overloaded methods called randomize. Each method will return a random number based on the parameters that it receives
    5·2 answers
  • ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
    7·1 answer
  • Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerica
    15·1 answer
  • Write a java program that would request user name, id number, and state the time the user has reported at work.​
    12·1 answer
  • The declarations and statements that compose the method definition are called the __________.
    9·1 answer
  • Ken is a mobile app developer. He is designing a mobile app that offers tips and guidance to people interested in learning jazz
    8·2 answers
  • Draw
    7·1 answer
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!