1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
9

Explain the term information security?​

Computers and Technology
1 answer:
Elodia [21]3 years ago
5 0

Answer:

Information security is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

You might be interested in
. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive intege
Sergio [31]

Answer:

The Following are the solution to this question:

Explanation:

In Option a:

In the point (i) \Omega is transitive, which means it converts one action to others object because if \Omega(f(n))=g(n) indicates c.g(n). It's true by definition, that becomes valid. But if \Omega(g(n))=h(n), which implies c.h(n). it's a very essential component. If c.h(n) < = g(n) = f(n) \. They  \Omega(f(n))   will also be h(n).  

In point (ii), The  value of \Theta is convergent since the \Theta(g(n))=f(n). It means they should be dual a and b constant variable, therefore a.g(n) could only be valid for the constant variable, that is  \frac{1}{a}\ \  and\ \ \frac{1}{b}.

In Option b:

In this algorithm, the input size value is equal to 1 object, and the value of  A is a polynomial-time complexity, which is similar to its outcome that is O(n^{2}). It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop(n^{2}). All internal loops operate on a total number of N^{2} generations and therefore the final time complexity is O(n^{2}).

6 0
3 years ago
Give me username ideas for rblx.
alexandr1967 [171]

Answer: Larz7, Dracofli0, butterbro171,OVOclan1011, ect.

Explanation:

4 0
3 years ago
Read 2 more answers
Which of these agents of education empowers the other..........
Tomtit [17]

Answer:

B. school

Explanation:

Because the school is where you learn and gain knowledge

4 0
2 years ago
Read 2 more answers
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
storchak [24]

Answer:C

Explanation:

The answer is C

6 0
2 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • George is a contractor who creates websites and web applications. What is George working as?
    7·2 answers
  • Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
    13·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • If a 120 V appliance requires 15 A to operate, what is the resistance of the appliance?
    10·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • What is a fire wall and how does it work
    6·1 answer
  • CHOOSE THE CORRECT CONTINUOUS TENSES( PRESENT CONTINUOUS,PAST CONTINUOUS AND FUTURE CONTINUOUS) : 1. I saw a snake while I _____
    10·1 answer
  • Please help me plss! PLS​
    8·2 answers
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!