1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
4 years ago
14

Sensitive data is always classified true or false

Computers and Technology
1 answer:
soldier1979 [14.2K]4 years ago
3 0
I believe your answer is true. Hope this helps! :)
-K <3
You might be interested in
Which type of software is primarily used to organize a collection of information for easy access?Which type of software is prima
MaRussiya [10]

Answer:

database - you could also use a spreadsheet but you can't ask questions that you can with a database

Explanation:

8 0
4 years ago
A debugging process in which you imagine that you are the computer executing a program is called :________
Norma-Jean [14]

Answer:

Hand Tracing.

Explanation:

6 0
2 years ago
Described how the HCS12 MCU uses a vector to find the correct interrupt service routine after an interrupt occurs.
Arte-miy333 [17]

Answer:

In the HC12 MCU, the starting address of interrupts is stored in the vector table as a vector. The ISR or interrupt service routine fetches the vector of the interrupt to be executed.

Explanation:

The HC12 or 68HC12 microcontroller was developed by Motorola, its controllers have a clock speed of between 8 to 33MHz.

The MCU stores interrupt events in a vector table where the interrupt service routine fetches enabled interrupt to execute.

When an interrupt is detected, the MCU stores all its registers in a stack to be able to return to the program it was previously running, then it disables the maskability flag register to prevent another maskable interrupt from occurring during the current interrupt execution.

The MCU interrupt service routine fetches the required interrupt from the vector table. After the interrupt is executed, the mask flag is enabled and the MCU retrieves or returns back to the previous program in the stack.

7 0
3 years ago
What is a algorithm
Butoxors [25]
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
7 0
4 years ago
Read 2 more answers
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
3 years ago
Other questions:
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • The next thing Maria wants to do is to indent the first line of her paragraph how dose she do it
    10·2 answers
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • What is python?????????
    11·1 answer
  • . Each year over _____ tires are scrapped in the United States alone.
    9·2 answers
  • Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
    11·1 answer
  • What value will be stored in the variable t after each of the following statements
    9·1 answer
  • Which of the following contains hardware systems similar to the affected organization but does not host live data?
    13·1 answer
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!