1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
2 years ago
10

Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access

and use information.
Computers and Technology
1 answer:
mojhsa [17]2 years ago
6 0

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

You might be interested in
Why is OS important in every data processing system? <br>Please Answer Fast! ​
Artist 52 [7]

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation:

6 0
2 years ago
Ethernet use a contention-based media access method defined by the IEEE 802.3 standards called ___ .
egoroff_w [7]

off the top of my head I think this might be (CSMA/CD)

4 0
3 years ago
To keep your computer working efficiently, it is a good idea to _____ unnecessary files. delete defragment save archive
Korolek [52]

Hey the answer to this is delete or remove. because it is a good idea to remove old files that your not using.

Hope this helps

-scav

3 0
3 years ago
You can use the _____ to specify the maximum amount of characters that can be entered in a textbox.
yulyashka [42]
I think the answer is limit
3 0
3 years ago
Finish the code to search for a 7 in the array.
guapka [62]

Answer:

The complete code is as follows:

from array import *

myArr = array('f',[3, 5, 7,3, 10])

location = myArr.index(7)

print(str("7")+" is at position "+str(location+1))

Explanation:

I made corrections to the third line of the code and I added a line

This line gets the index of 7 from the array myArr using the index keyword

location = myArr.index(7)

This line prints the position of the 7 in the array

print(str("7")+" is at position "+str(location+1))

8 0
2 years ago
Other questions:
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • What must be true before a motherboard can take advantage of the triple memory channels on the board?
    9·1 answer
  • 1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the
    13·1 answer
  • Please help, Tech class!!
    14·1 answer
  • . A collection of programs designed to create and manage databases is called a(n))
    13·1 answer
  • By the 1990s, ______________ technology enabled one person operating a desktop computer to control most—or even all—of these fun
    8·2 answers
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • List any four e-commerce website​
    5·2 answers
  • How do you find a single number or name you want in a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!