1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
5

How does human error relate to security risks

Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
8 0

Answer:

The error could let people through who really shouldn't be through

You might be interested in
You are a game designer and are going to give a presentation to a group of high school students to try to get them interested in
KiRa [710]

Answer:

Pick a concept. Generate a few game concepts to see what kind of game you want to make. ...

Gather information. Game creation involves extensive research. ...

Start building. ...

Refine your concept. ...

Test your game. ...

Market the finished product.

Explanation:

6 0
3 years ago
Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communicat
Readme [11.4K]

Answer:

Fiber-optic cable

Explanation:

Before the cable industry transitioned to fiber-optic cables, for many years, the standard cables used for telephone, cable, and internet communications were coaxial cables. The transition was made possible because the architecture of the fiber-optic cable came with a higher capacity, more extensive bandwidth link. Unlike the coaxial or the twisted pair cable, the fiber-optic is made from glass strands that transmit light signals much quicker and to greater distances. This makes fiber-optic cables the fastest high capacity data transfer link than any other cables to ever exist.

5 0
3 years ago
What are the two contextual tabs that appear when working with PivotTables?
Nutka1998 [239]

Answer:

<u>D.Analyze and Design</u>

8 0
3 years ago
Read 2 more answers
____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program pe
Vlada [557]
The answer is d labeling
7 0
3 years ago
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Other questions:
  • When an object is selected, it is surrounded by ________, which allow you to change the size of the object.?
    5·1 answer
  • A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
    13·1 answer
  • To select all the text in a document, press ____.
    12·2 answers
  • Which routine is configured to execute first when the program runs?
    7·1 answer
  • To get started with stock trading and to learn, many people start with this method to learn the ropes and practice with fake mon
    13·1 answer
  • Pablo can view a minimum of_____ panes and a maximum of_____ panes in a split screen worksheet.
    7·1 answer
  • ____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
    11·1 answer
  • The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
    8·1 answer
  • What is one potential problem with the following loop? System.out.print("Enter integers. Enter -1 to exit."); System.out.println
    12·1 answer
  • PLEASE HELP!!!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!