1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
9

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________.

Computers and Technology
1 answer:
vaieri [72.5K]3 years ago
7 0

Options:

(a) ensuring that a system is accessible when needed

(b) defining risk associated with a subject accessing an object

(c) ensuring that a system is not changed by a subject that is not authorized to do so

(d) ensuring that the right information is seen only by subjects that are authorized to see it

Answer:

(c) Ensuring that a system is not changed by a subject that is not authorized to do so.

Explanation:

Access control simply means controlling who accesses a particular data by putting necessary measures in place. The vital components of access control are explained briefly as follows:

<em>Confidentiality</em>: This refers to ensuring that sensitive information are getting to the right people and the right people only. Confidentiality ensures that data or information are getting to those that they are intended. Examples of sensitive information that require confidentiality are

i. Credit card details

ii. Passwords

<em>Integrity</em>: This refers to ensuring that the quality, consistency, accuracy and trustworthiness of an information does not change throughout its time.

It makes sure that data remains the same over a long period of time and in the event that it will be changed, it is not changed by unauthorized subject.

<em>Availability</em>: Just as the name implies, ensures that the data or information is available any time it is needed.

You might be interested in
Full form of DVX please answer fast ​
statuscvo [17]

Answer:

Devastating Vocal Xcellence

Explanation:

5 0
3 years ago
A retailer is able to track which products draw the most attention from its customers through the use of 5G-enabled motion senso
liubo4ka [24]

The technology that combines with 5G capabilities to allow the monitoring of shopping trends in this way is Augmented Reality.

  • Augmented reality is simply an enhanced version of the physical world and this is achieved by using digital sounds, and visual elements through technology.

  • It should be noted that augmented reality is vital to enhance shopping experience as interconnected mirrors and cameras are used which enhances customer satisfaction.

  • It should also be noted that augmented reality helps in the improvement of one's shopping experience because it'll be more interactive. When customers are being given control over digital elements, this makes them feel more connected to the brand.

In conclusion, augmented reality helps improve the revenue of a business.

Read related link on:

brainly.com/question/18952119

5 0
2 years ago
Please help will give brainliest
ludmilkaskok [199]

Answer:

waterfall- google search

Explanation:

5 0
3 years ago
Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
11111nata11111 [884]

Answer:

The answer is "Virtual supercomputer"

Explanation:

A supercomputer is a machine with or close to a maximum fastest operating output. It commonly used in science and engineering systems, that have to manage or calculate massive server numbers.

  • A virtual supercomputer is also known as a cloud device.  
  • It gives you to the platform, and provides you a built-in cloud environment, by mixing different virtual servers.
  • Its rebellion is to be used by individuals.

3 0
4 years ago
In the relocatable dynamic partitions scheme, the Memory Manager relocates programs to gather together all of the empty blocks a
kodGreya [7K]

Answer:

True

Explanation:

In computer, Memory management is a form of resource management, its essential requirement is to provide ways to dynamically allocate portions of memory to programs at their request, and to free it to be used again when not needed. Memory management is critical to any advanced computer system that uses more than a single process.

Several methods that has increased effectiveness of memory management like the Virtual memory systems which separates the memory addresses used by a process from actual physical addresses, thus allowing the separation of processes and increasing the size of the virtual address space beyond the available amount of Random Access Memory (RAM) using paging or swapping to secondary storage have been used.

"The Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in from your question.

6 0
3 years ago
Other questions:
  • For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
    13·1 answer
  • Define the term e-learning​
    5·2 answers
  • Side mirror using convex mirror or concave mirror?​
    5·2 answers
  • A single point of failure is a piece of hardware or application that is key to ________________________.
    8·1 answer
  • The acronym LAH stands for
    14·2 answers
  • The______for our newest game keeps changing as we develop our concept and refine our goals.
    11·2 answers
  • What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over
    7·1 answer
  • How many bits would be needed to count all the students in class today
    9·1 answer
  • One example of a <br> is the length of a car.
    7·1 answer
  • Two things every professional PowerPoint presentation should have
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!