1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
lora16 [44]
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
8 0
3 years ago
What is the purpose of using specialized supply chain software?
weeeeeb [17]

Answer:

The purpose of supply chain management is

On the most basic level, the purpose of supply chain management is to make inventory readily available in customer facing positions to fulfill demand. ... Supply chain partners must work together to maximize resource productivity, develop standardized processes, eliminate duplicate efforts, and minimize inventory levels

Explanation:

4 0
3 years ago
To assign a conditional value, use the ____ function.
zubka84 [21]
<span>To assign a conditional value, use the IFF function.  It is an abbreviation for  Immediate If.  It is a function </span>on spreadsheets that returns the second or third parameter based on the evaluation of the first parameter.  <span>You use </span>IIf<span> to determine if another expression is true or false. If the expression is true, 
</span>IIf<span> returns one value; if it is false, </span>IIf<span> returns another.</span>
3 0
3 years ago
Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
Soloha48 [4]

Answer:

boolean recalled;

((modelYear>=1999 && modelYear<=2002 && modelName=="Extravagant") || (modelYear>=2004 && modelYear<=2007 && modelName=="Guzzler")) ? recalled = true : recalled =false

Explanation:

Using a combination of comparison operators and logical operators, the conditions stated in the question is captured in the code snippet with the boolean variable recalled also declared. Since we are not allowed to use the if statement, we have used the conditional or ternary operator that checks if a condition is true executes the statment that follows the question mark else it executes the statement after the full colon.

3 0
3 years ago
a student is going to e-mail a file she has created and needs to reduce the file size. what tool should she use to reduce the fi
Dmitry_Shevchenko [17]

Answer:

Compress the file to reduce the file size.

8 0
2 years ago
Other questions:
  • Colleen is creating a document with two minimal paragraphs of text comparing two business models for her company. She decides to
    14·2 answers
  • Because HTML was designed as a cross-platform language, it is the preferred method of communicating with back-end databases. Tru
    8·1 answer
  • Changing the color of my avatar using a computer program is ok since it doesn't impact anyone else
    12·1 answer
  • Define the term Frame Rate.
    12·1 answer
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
    12·1 answer
  • What factors should you consider when buying a hard drive?
    8·1 answer
  • Which of the following is the largest measurement for the weight of a bag of dog food?
    9·2 answers
  • When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
    13·1 answer
  • Who is the founder of C language?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!