1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
.How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
Virty [35]
The overall kinetic energy of the 60mph car is greater than the overall kinetic energy of the 30mph car. Because of this, it takes a greater force to stop the faster car because it has greater amount of kinetic energy (aka the amount of force needed to overcome the momentum of the faster car is larger).
4 0
3 years ago
How can users create a shortcut to favorite websites and store them in their browser?
8090 [49]
I know the first one is A) Bookmark sites and I think the second one is B) Cross-platform capability. 
8 0
3 years ago
Read 2 more answers
Write a recursive function num_eights that takes a positive integer pos and returns the number of times the digit 8 appears in p
nata0808 [166]

Answer:

Explanation:

The following is written in Java. It creates the function num_eights and uses recursion to check how many times the digit 8 appears in the number passed as an argument. A test case has been created in the main method and the output can be seen in the image below highlighted in red.

  public static int num_eights(int pos){

       if (pos == 0)

           return 0;

       if (pos % 10 == 8)

           return 1 + num_eights(pos / 10);

       else

           return num_eights(pos / 10);

   }

7 0
2 years ago
What is one purpose of an essay’s conclusion paragraph?
vova2212 [387]
The purpose of the conclusion paragraph is not only to wrap up the essay, but also to show the strong and central points in the essay alone. Since you are wrapping up the essay, it's your final paragraph and you have to clearly state all of your points and what and why the essay is written (depends on what you are talking about). But, the one purpose of an essay's conclusion is to clearly state the central points of the essay.
3 0
3 years ago
) Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3 and Subnet 4. Suppose all of the interfaces in
erik [133]

Answer:

Check the explanation

Explanation:

223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.

The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000

Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)

So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26

Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)

and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25

Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)

So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28

4 0
3 years ago
Other questions:
  • A​ _______ helps us understand the nature of the distribution of a data set.
    10·1 answer
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • In C please:
    5·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • I will upvote....
    10·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • The terms Apps and Applications can be used interchangeably about software installed
    8·1 answer
  • What is good work ethic?​
    11·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • What is a file and where can we make use of a file?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!