1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
6

What does confidentiality of data refer to?

Computers and Technology
2 answers:
tekilochka [14]3 years ago
4 0

d) Rules which restrict access only to those who need to know
Semmy [17]3 years ago
3 0
A,rules which hide data
You might be interested in
Select three advantages of cloud computing.
Julli [10]

Answer:

A,B,and C

Explanation:

Hopefully this helps!

7 0
3 years ago
Brian is a computer engineer who writes security software for a banking system. The
pashok25 [27]

Answer:

Programming & Software Development

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model.

II. An incremental model.

III. A spiral model.

Also, programming refers to a software development process which typically involves writing the sets of instructions (codes) that are responsible for the proper functioning of a software.

In this scenario, Brian is a computer engineer who writes security software for a banking system.

Thus, the pathway in the Information Technology career cluster that Brian's job falls into is Programming & Software Development.

7 0
3 years ago
Write the definition of a public class Simple. The class has no constructors, methods or instance variables.
vazorg [7]

Answer:

public class Simple{}

Explanation:

6 0
3 years ago
Read 2 more answers
Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
dedylja [7]

To put it briefly, a byte is equivalent to a <em>character</em> in that it encodes a single character, being this in the form of a<u> letter, number, or symbol.</u>

A byte is the smallest unit of storage memory on any modern computer. This byte is commonly made up of<u> eight bits</u>, a combination of binary digits used to represent data. The hierarchy of computer memory is as follows:

  • 1 byte
  • 1 kilobyte
  • 1 megabyte
  • 1 gigabyte
  • 1 terabyte

The statement "<em>A byte is equivalent to a character</em>" is quite literal in its meaning given that through the use of the bits that comprise it, a byte is used to represent and store the data for a single character of text, being that a <u>letter, number or at times a symbol.</u>

<u />

To learn more:

brainly.com/question/13188094?referrer=searchResults

3 0
3 years ago
When you add text to a slide using presentation software, which of the following is important?
katrin [286]
I think the answer is B. The text should be brief. 
7 0
4 years ago
Read 2 more answers
Other questions:
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she
    10·1 answer
  • If images around the edges of a monitor do not look right, the computer might have a(n) access problem. hardware problem. Intern
    13·2 answers
  • Alto Innovations creates custom software for organizations. The company's managers want to build a high-performance culture in t
    11·1 answer
  • What message would you have gotten if your computer became infected with the elk cloner virus?
    7·1 answer
  • What is thhe name of service included with windows server operating systemthat manages a centralized database containing user ac
    5·1 answer
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • What are the defenses to protect against these attacks?
    13·1 answer
  • What is the output?
    6·2 answers
  • Weegee confused. <br><br> Why is weegee.org kitty website...?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!