1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
11

virtue by which you need to secure information by limiting computer access to authorized personnel only

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0
I don't get what you are trying to ask...
Please explain
You might be interested in
An international magazine publisher has commissioned you to do a series of images in black and white. The publisher distributes
CaHeK987 [17]

Answer:

I need to send black-and-white images in a print-ready format. Therefore, here are the steps I’d follow:

First, I’d shoot my images.

I’d use Photoshop to modify or correct the color of the images.

I’d convert the images into black-and-white versions.

I’d save the selected files in the TIFF format. This method will ensure that the images retain their quality and are print-ready.

I’d also convert these files into the JPEG format to get good-quality, low-resolution images for the client’s web publishing.

The Art Director requires images that they can modify, if required. Therefore, I’ll include files in the TIFF and PSD formats. These are open files and anyone can modify them.

I’d send all these saved copies to the magazine for their work.

Explanation:

just did it and it gave me this answer:)

5 0
3 years ago
One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
labwork [276]

An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

<h3>What protocol does the netstat command use?</h3>

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

<h3>What is netstat used for?</h3>

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

Learn more about troubleshoot from

brainly.com/question/9572941

#SPJ1

3 0
2 years ago
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
pychu [463]

Answer:

ADMINISTRATIVE CONTROL

Explanation:

If a potential employee is required to undergo a drug screening an Administrative Control is what will be conducted on the employee because

Administrative controls are training, procedure, policy that limit or prevent exposure of an individual to hazards. Examples of administrative controls include training, supervision, timing of work. Administrative controls are also changes in work procedures such as written safety policies, rules, supervision which is the reason the employee has to undergo drug screening using Administrative controls.

6 0
4 years ago
BRAINLIEST
Brilliant_brown [7]

Answer:

1. Don't

2. Do

3. Don't

4. Don't

5. Do

Hope it helps.......

3 0
3 years ago
Read 2 more answers
C
storchak [24]

Answer:

B. THE LARGER THE NETWORK, THE MORE JOB LEADS AVAILABLE

Explanation:

  • BECAUSE THATS MY ANSWER, AND IM CORRECT WITH THAT

<h2>STUDY WELL</h2>
4 0
2 years ago
Other questions:
  • When you see ##### in a cell, you should A. increase the cell width. B. increase the cell height. C. decrease the cell width. D.
    14·1 answer
  • What did basic elements of music look like in the Twentieth Century period?
    6·1 answer
  • 12. In 2009, __________ of all pedestrian fatalities were caused by impaired drivers
    9·2 answers
  • How fast is a backwards long jump in Super Mario 64?
    7·1 answer
  • Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
    9·1 answer
  • design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike co
    12·1 answer
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
  • What is the purpose of the Subtotal feature?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!