1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
7

To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia

ble economical secure
Computers and Technology
1 answer:
nasty-shy [4]3 years ago
7 0

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
You might be interested in
Write a python program to print the following series 3..10..31..94......n​<br><br>Pls answer fast..
butalik [34]

I've included my code in the picture below. Best of luck

8 0
3 years ago
def transfer(bank, log_in, userA, userB, amount): ''' In this function, you will try to make a transfer between two user account
laiz [17]

Answer:

def transfer(bank, log_in, userA, userB, amount): ''' In this function, you will try to make a transfer between two user accounts. bank is a dictionary where the key is the username and the value is the user's account balance. log_in is a dictionary where the key is the username and the value is the user's log-in status. amount is the amount to be transferred between user accounts (userA and userB). amount is always positive. What you will do: - Deduct the given amount from userA and add it to userB, which makes a transfer. - You should consider some following cases: - userA must be in the bank and his/her log-in status in log_in must be True. - userB must be in log_in, regardless of log-in status. userB can be absent in the bank. - No user can have a negative amount in their account. He/she must have a positive or zero balance. Return True if a transfer is made. For example:

Explanation:

i know this much

8 0
3 years ago
Under the ____________________, federal agencies must 1) review their IT systems for privacy risks, 2) post privacy policies on
nadya68 [22]

Answer:

E-Government Act of 2002.

Explanation:

The E-Government Act of 2002 is a statute of the United States of America which was enacted by the 107th U.S Congress on the 17th of December, 2002. The E-Government Act of 2002 was signed into law to facilitate the management and promotion of the US government processes and services, as well as enhance transparency and accountability between the government and the public through the application of internet-based information technology.

Under the E-Government Act of 2002, federal agencies must;

1. Review their IT systems for privacy risks.

2. Post privacy policies on their websites.

3. Post machine-readable privacy policies on their websites.

4. Report privacy activities.

3 0
3 years ago
What are the positive impact of computer in society
Brrunno [24]

Answer:

we can communicate many peoples

8 0
3 years ago
The action displayed in the status bar while pointing-
Mrac [35]

Answer:

c

Explanation:

6 0
3 years ago
Other questions:
  • In java write a program:A contact list is a place where you can store a specific contact with other associated information such
    8·1 answer
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • Replmon is the first tool you should use when troubleshooting Active Directory replication issues. State True or False.
    12·1 answer
  • Which part is the author’s address?
    5·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • Sarah has prepared a project document about the small and medium-sized companies in the United States. While proofreading, she r
    11·2 answers
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·2 answers
  • Which of the following statement is correct? Select one: a. Base register holds the size of a process. b. Limit register holds t
    10·1 answer
  • How many people in the world
    14·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!