1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

Organizations must protect their sensitive information through digital security measures and their _____ through physical securi

ty measures. Select 4 options.
IT infrastructure
equipment
employees
customers
RFID systems
Computers and Technology
2 answers:
DIA [1.3K]3 years ago
7 0

The answers are:

  • customers
  • employees
  • IT infrastructure
  • RFID systems

Explanation: Correct on Edg 2021.

Andreyy893 years ago
3 0

Answer:

IT infrastructure

Explanation:

and their IT infrastructure through physical security measures. There are two main ways of "hacking" a system. One is through a flaw in the software that is someone skilled enough can manipulate in order to gain access to the system and retrieve data or manipulate the system as they see fit. The second method is physically by accessing the IT infrastructure. If you were able to do so and there are no physical security measures you could simply plug into the infrastructure and access all the information that you want because you would be completely bypassing the digital security measures by doing so. That is why physical security measures are placed so that only qualified and vetted individuals have access to the infrastructure.

You might be interested in
The move toward access instead of ownership is a sign of collaborative consumption.
Nina [5.8K]

Answer:

the answer is true

Explanation:

8 0
3 years ago
See the file attached!​
Dimas [21]
  1. Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and over.
  2. The Mail Merge feature makes it easy to send the same letter to a large number of people.
  3. By using Mail Merge, we don't have to type each recipient's name separately in each letter.
  4. We need to proofread only the main document network database systems object- oriented database system Hierarchical database system.
6 0
2 years ago
The columns of a spreadsheet data source are A. form letters. B. the mailing list. C. data points. D. fields.
mojhsa [17]

I believe it is C, I'm so sorry if im incorrect.

8 0
3 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
What happens when variables in programming are not properly initialized? answers?
Romashka-Z-Leto [24]
Errors in compilation happen, or it runs but then doesn't recognize the input. Also you can't transform into other types of variables.
6 0
3 years ago
Other questions:
  • I need help please?!!!
    15·1 answer
  • Which type of communication is usually handwriten
    11·2 answers
  • How can vlan hopping attacks be prevented on a network?
    10·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills.
    6·1 answer
  • A user's computer will not boot. A technician notices four indicator lights on the backside of the
    8·1 answer
  • During the preventive maintenance phase of a project involving a hydraulic power system, an engineer must change a gasket on a p
    14·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!