1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
15

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also

be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to
Computers and Technology
1 answer:
bekas [8.4K]3 years ago
7 0

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

You might be interested in
Answer this question for points lol
Zanzabum

Explanation:

jxjxnxnxnxkxozj nxkakthanksssssss lolll

8 0
3 years ago
Read 2 more answers
To what are multiple servers arranged in racks related
qaws [65]

Various number of servers placed in racks are related to Rack servers in data center.

Explanation:

In data center commonly used server is Rack servers.  Servers are being arranged in the mounted racks are generally called as rack servers in the data center. Internal fans are being fitted inside the racks make the servers to make a good airflow and maintain the cooling. There are different types of racks available the user can choose based on their requirement.

5 0
3 years ago
Read 2 more answers
I need help with this problem please
alina1380 [7]

Answer:

i think its d

8 0
3 years ago
Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
Cloud [144]

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

3 0
2 years ago
Where do the projection lines converge in a perspective sketch?
Sophie [7]

Answer:

Option B, Vanishing point

Explanation:

The complete question is

Where do the projection lines converge in a perspective sketch?

A. the ground line

B. the vanishing line

C. the eye point

D. the horizon line

Solution

A point lying on the image of a perspective drawing where the drawings ( two-dimensional perspective projections) of two parallel line meet in three dimensional space is known as Vanishing point

8 0
3 years ago
Other questions:
  • Mobile devices typically come pre installed with standard apps like web browsers , media players, and mapping programs true or f
    9·1 answer
  • In Excel, what happens to the cell contents when you click and drag a cell into multiple cells?
    14·1 answer
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • As the operations manager for a supermarket chain, Mai needs to find a telecommunications technology that: enables managers in r
    9·1 answer
  • Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
    12·1 answer
  • What options of the hierarchical star topology within the ANSI/TIA-568-C allow the ability to move the workgroup switches closer
    7·1 answer
  • After adding an email account, how do you switch accounts to send a message?
    10·2 answers
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you i
    13·1 answer
  • A company database needs to store information about employees (identified by ssn, with salary and phone as attributes), departme
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!