1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
9

As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.

Confidential Public Controlled A. Accessible to everyone B. Not public but can be released without owner’s consent C. Cannot be released without owner’s consent.
Computers and Technology
1 answer:
Delicious77 [7]3 years ago
5 0

Answer:

 According to the confidentiality, the data are classified into the three ways that is confidential, public and controlled and it the data classification are matched according to to its particular definition are as follows:

Confidential  = (C) Cannot be released without owner's consent.

Public = (A) Accessible to everyone

Controlled = (B) Not public but can be released without owner's consent

 The confidentiality of the data is basically known as protecting the data from the unauthorized and unlawful access. The data confidentiality is the set of the rules which limit the unauthorized access to the confidential information and it is only available to the authorized people with the reliable access to the data.

You might be interested in
What is co-operating process
Greeley [361]

Answer: A process is independent if it cannot affect other process or be affected by it

Explanation:

3 0
4 years ago
What is the CPU Unit of a computer?
denis-greek [22]

Answer:

The computer's central processing unit (CPU) is the portion of a computer that retrieves and executes instructions. The CPU is essentially the brain of a CAD system. It consists of an arithmetic and logic unit (ALU), a control unit, and various registers.

Explanation:

.

4 0
3 years ago
Read 2 more answers
Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
____ [38]
Because of the capitalization; when talking about computer science and programming things have to be very tedious and specific. <span />
5 0
3 years ago
After running this Assembly language program below, give the final values in EAX, EBX, and ECX. MOV EAX, AAAAAAAA MOV EBX, BBBBB
Verdich [7]

Answer:

See explaination please.

Explanation:

We are going to get a solution by making use of the instruction;

Given The instruction,

MOV EAX, AAAAAAAA

MOV EBX, BBBBBBBB

MOV ECX, CCCCCCCC

This is going to move the defined values, say AAAAAAAA, BBBBBBBB, CCCCCCCC, to the registers EAX, EBX, ECX, respectively

Now,

PUSH AX

This push instruction pushes the first 8 bits in register EAX, to a stack,

again, PUSH BX

Also this push instructions will also push the first 8 bits in register EBX, to the stack

PUSH CX

This push instruction pushes the first 8 bits in register ECX, to the stack,

similarly PUSH BX PUSH AX PUSH CX pushes the 8 bit registers in the same stck,

NOw, the instructions POP EAX POP EBX POP ECX

will lead to the contents of the respective registers as

EAX=CCCCAAAA EBX=CCCCBBBB ECX=AAAACCCC

4 0
4 years ago
Read 2 more answers
A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
Yuri [45]

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

  • BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.
  • Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

5 0
3 years ago
Other questions:
  • Why is it important to bring standalone systems into the domain? 4?
    8·1 answer
  • Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?
    8·1 answer
  • What is a Qwerty?<br> A) It's a Computer<br> B) It's a keyboard <br> C) A type of frog
    11·2 answers
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • What are some benefits of web-based applications?
    8·2 answers
  • Denise is using Outlook 2016 in a business environment. Her company operates a Microsoft Exchange email server.
    6·2 answers
  • Iaz005<br> plz make a new zoom
    8·2 answers
  • "queries are questions", true or false?
    8·2 answers
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Select the correct answer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!