1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
12

the penalties for ignoring the requirements for protecting classified information when using social networking services are ____

___ when using other media and methods of dissemination?
Computers and Technology
1 answer:
uysha [10]3 years ago
7 0

Answer:

the same as

Explanation:

Classified information is confidential information that a government deems to be protected.

There are certain penalties for the person if they ignore any protection measure for classified information when using social networking services and the penalties are the same as if someone uses other media and methods of dissemination.

Hence, the correct answer for the blanks is "the same as".

You might be interested in
Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw ca
mihalych1998 [28]

Answer:

c. because RAW files are proprietary.

Explanation:

When scanners and digital cameras are used to capture images that are uncompressed or minimally processed image file, it is known as a RAW image file.

Generally, this file type are usually very large in size because of their lossless quality and does not have any alteration and as such have not been processed; thus, cannot be printed.

The term RAW image file is generally used to describe a variety of file formats, which are sometimes known as digital raw captures because RAW files are proprietary.

8 0
3 years ago
Janice is making her resume in which section should she include information about her previous employers , positions held , and
Volgvan

Generally, Janice should post information about her past employment in the Experience section, also often called as Professional Experience. The information that she should include is the name of the organization or company which previously employed her, her positions there, length of each position, and a description of what she did in the position.

4 0
3 years ago
Is there any app that understands fake photos<br><br><br>help me i need to know it​
Lapatulllka [165]

Answer:

Tineye Image Recognition. This app allows users to upload a picture or a URL to trace where else it appears online. ...

Reversee. This app stays true to its name. ...

Camfind. ...

Reverse Image Search.

7 0
3 years ago
Read 2 more answers
Examples of intermediate technology​
Effectus [21]

Example of intermediate technology is the treadle pump, which enables farmers to provide a greater amount of water to their plants more easily compared to watering by bucket, while requiring much less infrastructure than constructing irrigation dams and pipes.

3 0
3 years ago
Read 2 more answers
Suppose you are purchasing something online on the Internet. At the website, you get a 10% discount if you are a member. Additio
patriot [66]

Answer:

<em>The function is written in C++</em>

void calc_discount(double amount,bool member)

{

 double discount;

 if(member)

 {

  discount = amount - 0.10 * amount - 0.05 * amount;

 }

 else

 {

  discount = amount - 0.05 * amount;

 }

 cout<<"Discount = "<<discount;

}

Explanation:

<em>I've included the full source code (including the main method) as an attachment where I use comments as explanations</em>

Download cpp
6 0
3 years ago
Other questions:
  • When working with data returned from a query wizard, refreshing a query occasionally produces undesired results. if this occurs,
    9·1 answer
  • Describe the four techniques mentioned in the article that help you, the speaker, keep your audience engaged
    9·1 answer
  • Which answer best describes an unsubsidized federal loan
    9·1 answer
  • Which type of spreadsheet cell represents the left hand sides (lhs) formulas in an optimization analysis?
    5·1 answer
  • Which unique address is a 128-bit address written in hexadecimal?
    13·1 answer
  • ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
    14·1 answer
  • PHP server scripts are surrounded by delimiters, which? *
    5·1 answer
  • Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
    15·1 answer
  • How do i make a comment on brainly?
    15·1 answer
  • Your company is getting negative feedback on the current customer service process. It’s your job to make sure customers are happ
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!