1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
Using a personal computer to produce high quality printed documents
alisha [4.7K]

Answer:

Desktop publishing

6 0
3 years ago
Look at the following partial class definition, and then respond to the questions that follow it:
zhannawk [14.2K]

Solution :

a.

public Book($\text{String title}$, String author, $\text{String publisher}$, int $\text{copiesSold}$) {

 this.$\text{title}$ = $\text{title}$;

 this.$\text{author}$ = $\text{author}$;

 this.$\text{publisher}$ = $\text{publisher}$;

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

b). $\text{public String}$ getTitle() {

 return $\text{title}$;

}

$\text{public void}$ setTitle($\text{String title}$) {

 this.$\text{title}$ = $\text{title}$;

}

$\text{public String}$ getAuthor() {

 return author;

}

$\text{public void}$ setAuthor(String author) {

 this.$\text{author}$ = $\text{author}$;

}

$\text{public String}$ getPublisher() {

 return $\text{publisher}$;

}

$\text{public void}$ setPublisher(String $\text{publisher}$) {

 this.$\text{publisher}$ =$\text{publisher}$;

}

public int get$\text{copiesSold}$() {

 return $\text{copiesSold}$;

}

$\text{public void}$ set$\text{copiesSold}$(int $\text{copiesSold}$) {

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

}

4 0
3 years ago
Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
ale4655 [162]

Answer:

The answer is D and E

Explanation:

There is no much difference between a port replicator and a docking station. These two terms are used interchangeably and both serve the same purpose of connecting portable computers with other devices with little or no effort. The main difference between the two is that a port replicator provides a solution for all laptops through USB while a docking uses a propriety connector to the computer. Users can use a docking station and a port replicator to convert their laptop PCs into desktop computers when at home or in the office.

7 0
3 years ago
How to hack my neighboor wireless?​
guapka [62]

Answer:

 

How to Hack your Neighbor’s WiFi Password Using Tools

BY NEVIL PATELLEAVE A COMMENT

Getting a WiFi connection is a major concern once you are addicted to the web and mostly in the online world. When we hear the term hack, it strikes in our mind that it is the job of a high-end technology guy or a hacker. But to “hack WiFi password”, you don’t need to be a skilled technologist because even a non-technical guy can do it with some tricks and methods.

Most people have asked me the procedure to crack WiFi passwords, so today I am here with the solution and tricks for internet hack free WiFi from the major providers like AT&T, Comcast, and Xfinity.

 

wifi-password-hack

P.S. The WiFi password hacker tools are meant for fun/general purpose only and do not contain any functionality to attempt criminal acts. Therefore, you should be very cautious while operating them.

Wifi Hacker tools

(1) WiFi Hacker

WiFi Hacker is a simple and informal tool that makes hacking WiFi easy and safe without having required any technical knowledge. This software can crack WiFi passwords with some clicks and hack unlimited WiFi networks. WiFi Hacker gives you access to multiple offices or school wifi networks, including Comcast, AT&T, etc. which are equipped with tighter security. You can hack any locked password within minutes and anonymously because WiFi Hacker conceals your identity and personal information.

Explanation:

muwhahaha

7 0
3 years ago
Which view allows you to make changes to the content of your presentation?
Neporo4naja [7]

Answer:

Share your screen and edits the parts you want. What meet are you using, zoom or something else?

6 0
3 years ago
Other questions:
  • Matt wants to build an app that will reach many people all over the world. However, he worries about having to modify apps for a
    14·1 answer
  • Which is the highest level of the hierarchy of needs model?
    7·2 answers
  • Which is a correctly formatted Python tuple?
    9·1 answer
  • In this lab, you will build a system for package delivery services that provides different shipping options with specific price.
    6·1 answer
  • Blood Alcohol Level (BAL) is the ratio between the alcohol consumed and the blood in the body. A. True B. False
    12·2 answers
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • You will include code that will validate all user input. If the user inputs an invalid value, the program will respond with an e
    14·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • What does it mean when your phone says not registered on network?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!