1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

Organizations must protect their sensitive information through digital security measures and their _____ through physical securi

ty measures. Select 4 options.
IT infrastructure
equipment
employees
customers
RFID systems
Computers and Technology
2 answers:
DIA [1.3K]3 years ago
7 0

The answers are:

  • customers
  • employees
  • IT infrastructure
  • RFID systems

Explanation: Correct on Edg 2021.

Andreyy893 years ago
3 0

Answer:

IT infrastructure

Explanation:

and their IT infrastructure through physical security measures. There are two main ways of "hacking" a system. One is through a flaw in the software that is someone skilled enough can manipulate in order to gain access to the system and retrieve data or manipulate the system as they see fit. The second method is physically by accessing the IT infrastructure. If you were able to do so and there are no physical security measures you could simply plug into the infrastructure and access all the information that you want because you would be completely bypassing the digital security measures by doing so. That is why physical security measures are placed so that only qualified and vetted individuals have access to the infrastructure.

You might be interested in
The part of the computer that provides access to the internet is the-?
Rina8888 [55]
The answer is D. Modem
7 0
3 years ago
Read 2 more answers
Please select the word from the list that best fits the definition
ElenaW [278]

bro what thats rly vague?

6 0
3 years ago
Read 2 more answers
What is the main function of an operating system​
alina1380 [7]

Here are the main functions of an operating system:

1) Manage the resources of the device

The operating system controls how much of each resource is distributed, and it controls things like the processing unit and memory.

2) Establish a interface for the user of the device

The operating system must classify what the classes of the script/code have to do and what they implement.

3) Service application software

The operating system must service each application that is downloaded onto the device. It must balance it's use of storage between apps.

4 0
3 years ago
As a technical project​ manager, you have decided to propose implementing a prototyping methodology for a small​ web-based desig
Arlecino [84]

Answer:

B: Use the prototype and revise and enhance the prototype.

Explanation:

Before going ahead to execute any project, one must define the requirements for the project. It is only after the requirements for the project is known that one can go ahead to develop the prototype, use the prototype, revise and then enhance the prototype.

4 0
4 years ago
"A ____ is loosely defined as a very small device that has some built-in computing or Internet capability"
gizmo_the_mogwai [7]

Answer:

A mobile device is loosely defined as a very small device that has some built-in computing or Internet capability.

Explanation:

A mobile device also referred to as a handheld device is a computer device small enough to hold and operate in the hand.

Mobile devices can connect to the Internet and interconnect with other devices such as headsets through Wi-Fi, Bluetooth, cellular networks or near field communication (NFC).

Examples are: Smartphones, Tablets, Calculator , Digital media player , Handheld game console , Laptop , Mobile Internet Device (MID) , Personal Digital Assistant (PDA) , and Pocket calculator .

7 0
3 years ago
Other questions:
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • To remove an embedded chart, you should _____ it and press the DELETE key.
    14·2 answers
  • Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
    8·1 answer
  • What are three metrics used to define consistent network application availability?
    5·1 answer
  • Share a bit about your experience using Microsoft so far
    5·1 answer
  • This is a while loop question for Information technology.
    11·1 answer
  • Which of the following is NOT a reason to use cryptography?
    5·2 answers
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
  • For what three media types can Photoshop optimize images? ​
    10·1 answer
  • Think about a good game story that made you feel a mix of positive and negative emotions. What was the story, what emotions did
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!