1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state
Scorpion4ik [409]

I believe the answer is 'worst-case scenario.'

8 0
3 years ago
The 1934 Act proxy registration requirements: a. apply only to management. b. include a requirement for shareholders' proposals.
natita [175]

Answer:

The answer is "Option b"

Explanation:

The proxy is an external server, that distinguishes users from their browsing sites. It offers various features, privacy and security standards based upon the application, requirements or corporate policies, this act is used in the skilled security attorneys, primary care physicians, bookkeepers, brokers, and insurers shall apply securities laws, and other options are wrong, which can be explained as follows:

  • In option a, It is wrong, because it uses in every type of online software.
  • In option c, It is wrong, because it requests for dissident.
6 0
3 years ago
A technician wants to connect a computer to a high-definition television (HDTV). The technician has attached an HDMI cable from
kirill115 [55]

The correct option that was used for audio pass-through is;

<u><em>Option B; HDMI Out</em></u>

<u><em /></u>

      We are told that the technician attached an HDMI cable from the video card to connect it to the television.

Now, HDMI means High Definition Multimedia Interface and it has two parts which are HDMI In and HDMI Out.

HDMI Out is used to feed the audio pass through and visual signals,

whereas HDMI In is used to receive these audio pass through and visual

signals.

Looking at the given options, the only correct answer is HDMI Out.

Read more at; brainly.com/question/24637033

4 0
3 years ago
(C Language) Write a program to display a histogram based on a number entered by the user. A histogram is a graphical representa
Kobotan [32]

Answer:

Explanation:

Note: Could you plz go through this code and let me know if u need any changes in this.Thank You

=================================

#include <stdio.h>

#include <stdlib.h>

#include <ctype.h>

#include <string.h>

int main() {

  //Declaring constants

const int MIN=1;

  const int MAX=40;

 

  //Declaring variables

  int num,i;

      printf("Enter a non-zero positive number less than 40: ");  

     

     

/* This while loop continues to execute

* until the user enters a number <=0

*/

  while(1)

  {

      scanf("%d",&num);

      if(num<=0)

      {

          break;

      }

      else if(num>40)

      {

      printf("The number entered was greater than %d.\n",MAX);

          printf("Please re-enter: ");

      }

      else

      {

          for(i=0;i<num;i++)

          {

              printf("*");

          }

          printf("%d\n",num);

          printf("Enter another non-zero positive number less than 40: ");

      }

         

  }

 

  printf("bye...");

  return 0;

 

}

================================

output:

Enter a non-zero positive number less than 40:5

*****5

Enter another non zero positive number less than 40: 48

The number entered was greater than 40.

please Re-enter: 8

********8

Enter another non zero positive number less than 40: 1

bye...

---------------------------------------------

Process exited after 15.48 seconds with return value 0

Press any key to continue.......

3 0
3 years ago
WILL GIVE BRAINLIEST!!!!
sineoko [7]

Answer:

Application Software

7 0
3 years ago
Read 2 more answers
Other questions:
  • You are creating a budget for your new business.What should you include
    15·1 answer
  • What is the recommended size for bulleted text?
    5·2 answers
  • Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
    5·1 answer
  • Executives of a company deal less with details of the operational activities and deal more with the higher meaningful aggregatio
    14·1 answer
  • Which of the following statements is NOT true about url extension?
    10·2 answers
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    12·1 answer
  • Write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​
    9·1 answer
  • A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previo
    6·1 answer
  • FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
    11·2 answers
  • Hurry please i need this ASAP<br><br>What might be some advantages to keeping CSS and HTML separate?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!