1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
11

virtue by which you need to secure information by limiting computer access to authorized personnel only

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0
I don't get what you are trying to ask...
Please explain
You might be interested in
After selecting multiple calendars, how do you view them in one single calendar? Open the Backstage view and then the Calendar o
blsea [12.9K]

Answer:

its D. in the calendar view, click the view tab, and click they overlay button.

Explanation:

i just got it right on edge 2020

6 0
3 years ago
Read 2 more answers
The format that you will use on your works cited page when the entry is longer than one line is__________.
OverLord2011 [107]

The format that you will use on your works cited page when the entry is longer than one line is to second and all subsequent lines need to be indented half an inch.

<h3>What kind of formatting is used on a works cited page?</h3>

In the formatting of the Works on Cited page, the layout is that "Title the page Works Cited, do put it on the center and in plain text (no italics, bold, or underline). etc.

Note that the format to use when  your works cited page  entry is more than one line is to second and all subsequent lines need to be indented half an inch.

Learn more about cited page from

brainly.com/question/1382377

4 0
2 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the
ira [324]

Answer:

True

Explanation:

Frame Tagging is a method Cisco developed to identify packets travelling through links also called VLAN Tagging.

8 0
3 years ago
What does manual exposure mean
Julli [10]
Amount of light per unit area
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a direct payment subsidy?
    12·1 answer
  • 1. Describe a linear search (explain how it works).
    13·1 answer
  • If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
    11·1 answer
  • Word processing programs have different view options that you can use depending on the tasks your performing
    5·1 answer
  • Which of the following is not something that consumers need to pay attention to order to make rational choices
    6·2 answers
  • Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
    6·2 answers
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • Who created fortnite
    15·2 answers
  • The area of the spreadsheet highlighted in red is the _____.
    12·1 answer
  • Task 2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!