1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
15

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also

be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to
Computers and Technology
1 answer:
bekas [8.4K]3 years ago
7 0

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

You might be interested in
Anyone know how to do point hack​
skelet666 [1.2K]

Answer:

No

Explanation:

yes maybe sure look up

5 0
3 years ago
Read 2 more answers
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRIST AND CORRECT
forsale [732]

Answer:

Act like search engines

Explanation:

They will give you intel on about basically anything and they have their own opinion on it aswell‍♀️

4 0
3 years ago
Read 2 more answers
What is the name given to the software testing technique, which basically consists of finding implementation bugs using malforme
cupoosta [38]

Answer:

Fuzz testing

Explanation:

Fuzz testing technique was developed by Professor Barton Miller and his students in the year 1989 at the University of Wisconsin Madison. This Fuzz testing technique is used in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

6 0
4 years ago
Read 2 more answers
How much cell phone data does the average person use a month
azamat
It all depends on what you're doing online.
7 0
3 years ago
Suppose that the code below is the body of some loop. Given variables x and y write some code that reads a value into the variab
ra1l [238]

Answer:

I will code in JAVA.

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

     float x;

     float y;

     float result;

     Scanner input = new Scanner(System.in);

     while(true){ <em>//this is an infinite loop</em>

       x = input.nextFloat(); <em>//wait the input for x</em>

       y = input.nextFloat(); <em>//wait the input for y</em>

       if(y == 0) {

         continue; <em>//next iteration without print.</em>

       } else{

         result = x/y;

         System.out.print(result); <em>//print the result.</em>

       }

     }

 }

}

Explanation:

To get the numbers, you need to import Scanner class, and use the method nextFloat() to admit floats and integers.

If y is 0 then, executes the continue statement, if not prints the division between x and y.

4 0
4 years ago
Other questions:
  • Pam wants to include a video from a website in an upcoming presentation. However, she knows she will not have access to an inter
    15·2 answers
  • Acomputer with a domain name is called a
    8·1 answer
  • Which magazine loved their alienware test pc so much they didn't want to send it back?
    11·1 answer
  • A thesaurus can be used to look up a (n) or word similar in meaning to a given word
    15·1 answer
  • Speed in a given direction is called
    12·2 answers
  • (1) Prompt the user to enter a string of their choosing. Output the string.
    11·1 answer
  • The private field, which is known as the property‘s __________, holds any data that is assigned to the property.a. private datab.
    9·1 answer
  • HELP
    11·1 answer
  • For what reasons do readers use text-to-speech tools? Check all that apply.
    8·2 answers
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!