1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
12

Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati

on is called a)Digital Watermark b)Information Rights Management (IRM) c)None of these are correct d)Data Loss Prevention (DLP)
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
7 0

Answer:

d. Data Loss Prevention (DLP)

Explanation:

Data Loss Prevention (DLP) -

It refers to the type of strategy , where any sensitive or personal information can not be leaked out in the corporate network , is referred to as data loss prevention .

There are various software products that help to save the data , by controlling the information shared by the users .

The method is important for any business .

Hence , from the given scenario of the question ,

The correct answer is d. Data Loss Prevention (DLP) .

You might be interested in
Which of these is an.optical medium of storage?
makkiz [27]
Do you have some answer choices?
8 0
3 years ago
What property of semi-metals is useful in the computer industry?
artcher [175]
The answer is (a. Semi-conducting)
In the computer industry, semi-metals with a semiconducting property are useful in making of semiconductors. These metals have high resistance but lower than compare to insulators. This conductor could be crystalline or amorphous solids.
4 0
3 years ago
What are the pros and cons of using the internet in a medical office setting?
Shkiper50 [21]
Pros: are doctors are able to educate themselves in order to diagnose a patient, it's fast and convenient to put in records, medical facilities can transfer information from different locations etc.

Cons: the system can breached, this could leak health and personal information from patients, and the power could go down, delaying the use of signing in patients and etc
5 0
3 years ago
PLEASE HELP ME!!! I NEED THIS ASAP!!!
Brums [2.3K]

Answer:

This rule helps you take eye-catching pictures by using one of the most effective ... If you want to take pictures that have a “wow” factor built in them, the Rule of Thirds is ... Camera shake or blur is something that can plague any photographer and here ... There's no reason why you can't leave it on for all of your photography.

6 0
4 years ago
Create a constructor that requires parameters for the job number and estimated hours only. Also, include a ToString() method tha
Elodia [21]

Answer:

See explaination

Explanation:

Job.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

public class Job

{

private int jobNumber;

private int estimatedHours;

private double price;

public Job(int jobNum, int estHrs)

{

jobNumber = jobNum;

estimatedHours = estHrs;

CalculatePrice();

}

public int JobNumber { get; set; }

public int EstimatedHours

{

get { return estimatedHours; }

set { estimatedHours = value; CalculatePrice(); }

}

private void CalculatePrice()

{

price = estimatedHours * 45;

}

public virtual double getPrice()

{

return price;

}

public override string ToString()

{

return GetType() + "\n" +

"Job No: " + jobNumber + "\n" +

"Est. Hrs.: " + estimatedHours + "\n" +

"Price: $" + price;

}

}

}

RushJob.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

public class RushJob : Job

{

private double additionalCharge;

public RushJob(int jobNum, int estHrs, double additionalCharge):base(jobNum, estHrs)

{

this.additionalCharge = additionalCharge;

}

public override double getPrice()

{

return this.additionalCharge + base.getPrice();

}

public override string ToString()

{

return

base.ToString() + "\n" +

"Additional Charge: $" + this.additionalCharge + "\n" +

"Total Price: $" + getPrice();

}

}

}

JobDemo.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

class JobDemo

{

static void Main(string[] args)

{

Job job = new Job(101, 10);

Console.WriteLine(job.ToString());

Job rushJob = new RushJob(102, 15, 5);

Console.WriteLine("\n"+rushJob.ToString());

Console.ReadKey();

}

}

}

5 0
3 years ago
Other questions:
  • . What part of the communication feedback loop results in unclear communication? A. Sender's message B. Interference C. Message
    6·2 answers
  • If a ≤m b and b is regular, does that imply that a is a regular language? why or why not?
    6·1 answer
  • Word how to create a text box with lines 2013
    6·1 answer
  • answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in
    15·1 answer
  • Design and implement an application that reads an integer value representing a year from the user. The purpose of the program is
    6·1 answer
  • I’m turning my Pinterest into a professional account what should be my user name please try to think of a good name and not just
    11·2 answers
  • Please someone help!!!!
    15·1 answer
  • Which scenario describes a student citing an online source in his or her work?
    8·2 answers
  • Plz plz plz subsribe to my channel, CookieFunTime
    13·1 answer
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!