1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
2 years ago
9

As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.

Confidential Public Controlled A. Accessible to everyone B. Not public but can be released without owner’s consent C. Cannot be released without owner’s consent.
Computers and Technology
1 answer:
Delicious77 [7]2 years ago
5 0

Answer:

 According to the confidentiality, the data are classified into the three ways that is confidential, public and controlled and it the data classification are matched according to to its particular definition are as follows:

Confidential  = (C) Cannot be released without owner's consent.

Public = (A) Accessible to everyone

Controlled = (B) Not public but can be released without owner's consent

 The confidentiality of the data is basically known as protecting the data from the unauthorized and unlawful access. The data confidentiality is the set of the rules which limit the unauthorized access to the confidential information and it is only available to the authorized people with the reliable access to the data.

You might be interested in
True or false? any webb app can be accessed and run on any computing
Mademuasel [1]

Answer:

B. False

Explanation:

A web application is a computer program that  works over the internet. So, in order to access and run it you need a web browser and this will also require to have an internet access. If you don't have one of these you will not be able to run the app.

6 0
2 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
2 years ago
Read 2 more answers
AD and BC are equal perpendiculars to a line segment AB (see figure). Show that CD
Simora [160]
Show the picture to answer the question
7 0
2 years ago
CLS
Ainat [17]

Answer:

INPUT "Enter your marks in computer"<u><em>;</em></u>CS

<u><em>IF</em></u> C>40 THEN

PRINT "You are passed. <u><em>"</em></u>

ELSE

PRINT "You are failed."

END <u><em>IF</em></u>

Explanation:

see corrections above.

5 0
3 years ago
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
Cerrena [4.2K]

There are different kinds of applications.  Control objects control the flow of the application.

<h3>What works the flow of control in a program?</h3>

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

brainly.com/question/23275071

7 0
2 years ago
Other questions:
  • How to reset your password if you changed your email and dont remember password?
    6·1 answer
  • What are 3 characteristics of syndrome E?
    13·1 answer
  • You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
    5·2 answers
  • Which network topology requires terminators at the ends of the backbone cable?
    6·1 answer
  • If you need to show slides on a wide-screen monitor, you might change their size to: Select one: a. Onscreen Show (16:9) b. Onsc
    11·1 answer
  • Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
    14·2 answers
  • Gta! ! ! !!aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    11·2 answers
  • If i don't update my computer what threat does my computer face?
    6·1 answer
  • I am not a living being, I am a cylindrical shape that has three to eight sides. I never die. I can build anything again. What i
    5·1 answer
  • What term is used to describe our connection with eachother through technology
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!