1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
7

The Telecommunications, Network, and Internet Security domain of information security is also concerned with the prevention and

detection of the misuse or abuse of systems, which poses a threat to the tenets of__________
A. confidentiality, integrity, and entity (CIE).
B. confidentiality, integrity, and authenticity (CIA).
C. confidentiality, integrity, and availability (CIA).
D. confidentiality, integrity, and liability (CIL).
Computers and Technology
1 answer:
MA_775_DIABLO [31]3 years ago
7 0

Answer:

The answer is "Option C".

Explanation:

In the Information Security, the area of telecom, channel, and internet security often covers and provides the protection, which is an identification of system misuse that poses a threat to safety, privacy, and availability, and wrong option can be described as follows:

  • In option A, It defines the essential details and also reduces the influence of continuous culture.
  • In option B, It provides access to authorized people.
  • In option D, It is a part of the account sections.
You might be interested in
The =COUNT function calculates what value?
kirill [66]

Answer:

adds up the values in the range of cells provided

Explanation:

3 0
3 years ago
Read 2 more answers
Python: Write a program that prompts the user for a meal: breakfast, lunch, or dinner. Then using if statements and else stateme
Alexeev081 [22]

The program prompts user for the time of meal they will be having and a suggestion made on their behalf. The program is written in python 3 thus :

meal= input('your meal : ')

<em>#prompts</em><em> </em><em>user</em><em> </em><em>to</em><em> </em><em>enter</em><em> </em><em>a</em><em> </em><em>meal</em><em> </em><em>type</em><em> </em>

if meal == 'breakfast' :

<em>#check</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>breakfast</em><em> </em>

print('How about some Avocado')

elif meal == 'lunch' :

<em>#checks</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>lunch</em><em> </em>

print('like some grapes?')

else:

print('would rice be ok?')

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em>.</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em>brainly.com/question/25531734</em>

8 0
3 years ago
What is LATEX ? <br>create a latex command
AVprozaik [17]

Latex is a software used for writing daily life issue like integrations,fractions ,limits .

Lets see an example

\\ \bull\tt\longmapsto \displaystyle{\int}vdx

\\ \bull\tt\longmapsto \displaystyle{\lim_{x\to 0}}

5 0
3 years ago
Typically, a dvd has how many times more capacity than a cd?
Marianna [84]
For a simple answer, it is aproximately 7 times more than a CD.
6 0
3 years ago
The undo function allows the user to cancel up to _____ previous typing actions
valina [46]
It can cancel up to 40 times.
4 0
4 years ago
Read 2 more answers
Other questions:
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • Which of the following is the most significant outcome of the formation of the SMPTE?
    6·2 answers
  • Dell Computers is a nationally recognized manufacturer of computers for the small business and home markets. If Dell were to ord
    9·1 answer
  • What factors contribute to food wastage
    12·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • There are 2048bytes in4megabytes true or false​
    10·1 answer
  • What are LinkedIn automation tools used for?
    14·1 answer
  • 9. Changing from a bystander to an advocate requires
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!