1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
5

In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme

ntation of all subsequent security controls is known as a __________.
Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
6 0

Answer:

Framework.

Explanation:

In information security, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls is known as a framework.

You might be interested in
What is an activity that can help you enhance the appearance of your computer’s desktop?
Vanyuwa [196]
I suppose change the background picture/colour ?
5 0
3 years ago
What are some legal issues that can arise from the use of social media?
Andrews [41]

Answer:

Some of the particular legal concerns for businesses' social media are the right to privacy, defamation, advertising law, intellectual property (IP) law, etc. As a brand, you have to be careful while sharing any content on social media as sometimes it may infringe on a copyright, a trademark, or other IP rights

Explanation:

hope this helps

6 0
2 years ago
Python: Bad input on line 8. What is the fix, please can someone tell me I’m desperate?
JulijaS [17]

Answer: use GitHub or stack over flow or

repl. it

Explanation:

8 0
3 years ago
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
Helga [31]

Answer:

Option(d) is the correct answer to the given question .

Explanation:

There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The  main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.

  • The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
  • The Option (b) is wrong because In the key scheduling  we do not used the  the random key for the encryption process .
  • The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.

3 0
3 years ago
You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
Flauer [41]

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

7 0
4 years ago
Other questions:
  • If you print a document with red green or blue underlines will they show up on printed pages
    14·1 answer
  • The _____ is a narrative description of the product, service, or information system.
    7·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • Write a python program that requests a positive integer from the user, determines if it is a composite, a prime or neither prime
    8·1 answer
  • Write a Java program that has a static method named range that takes an array of integers as a parameter and returns the range o
    10·1 answer
  • PLEASE HELP I mainly only need the answer for 4.
    5·1 answer
  • Wht is these things Aᔑ bʖ cᓵ d↸ eᒷ f⎓ g⊣ h⍑ i╎
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!