1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
13

To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security

level must allow reasonable access, yet protect against threats.
a. True
b. False
Computers and Technology
1 answer:
marta [7]3 years ago
7 0

the answer is True

there has to be a balance between security and the user experience

You might be interested in
Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
Assoli18 [71]

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

  • In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2".
  • In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

4 0
3 years ago
What type of USB connector is always plugged into the computer to connect in external device
barxatty [35]
HDMI? I am not entirely sure
4 0
3 years ago
The main reason to set a field size in access is to:
Nadya [2.5K]
The main reason to set a field size in access is to limit the lengths of value in the table.
Field size determines the limits or determines the maximum of text that can be input in the text or number field. Also, it may reduce data entry errors in changing the field size in access.
4 0
4 years ago
Does any one know how to do addition of binary numbers​
Alla [95]

Answer:

The addition of binary numbers is done by adding the digits starting from the right side of the numbers, in the same way as we add two or more base 10 numbers. In binary addition, the place values are given as ones, twos, fours, eights, sixteens, etc.

Explanation:

3 0
3 years ago
An administrator helps a user obtain an Internet connection through connecting a laptop with a smartphone via a cable. What has
frez [133]
The administrator set up tethering
8 0
3 years ago
Other questions:
  • Elisa and josh need to access general helps. Elisa will press the F1 key. josh will on ?. who will access general help
    15·1 answer
  • Numeric data is stored in ___________ for direct processing.
    10·2 answers
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • Approximately what percentage of the world population owns a smartphone?
    9·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    13·2 answers
  • Which social media post indicates your home may be unattended?
    10·1 answer
  • Suppose x and y are int variables and ch is a char variable. Consider the following input: 5 28 36 What value (if any) is assign
    11·1 answer
  • What is the definition of overflow in binary?
    6·1 answer
  • What is the benefit of making an archive folder visible in the Outlook folder list?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!