1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
12

Which activity constitutes legal computer activity?

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
3 0
c.

b\c it's copy write so you can download that but not a. b. or d.
You might be interested in
For each entity, select the attribute that could be the unique identifier of each entity.
Alika [10]

Answer:

"student ID, number and title" is the correct answer for the above question.

Explanation:

  • The primary key is used to read the data of a table. It can not be duplicated or null for any records.
  • The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID".
  • The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".
  • The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".
3 0
3 years ago
URGENT HELPP<br> WILL MARK BRAINLIST
Semenov [28]

Answer:

1. (1) Travel guide, (2) Study notes for students , (3) Some creative ideas that I want to share with others

2. (1) he or she would have some work related to the website I have created, (2) he or she would be interested in knowing about something which would be available in my created website

3. I want to learn how to add photos in the html pages

3 0
3 years ago
ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
kolezko [41]

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

8 0
3 years ago
What does limited access to a document mean?
OverLord2011 [107]
Limited access to a document usually means that the creator of the document is able to limit how much access one person is able to get.
8 0
3 years ago
Read 2 more answers
Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is wo
Liono4ka [1.6K]
Have the packets virtual
6 0
3 years ago
Other questions:
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • Match each storyboarding technique with its appropriate description
    9·1 answer
  • At what point is an idea protected by copyright?
    7·2 answers
  • How do you take a screenshot on an iPhone?
    8·2 answers
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • Give sally sue specific suggestions on how she can improve her powerpoint skills.
    6·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • Why is lateral reading an important tool when reading material in social media or any online source
    15·1 answer
  • 3.<br>Give two reasons why everyone should study technology<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!