1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
14

Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt

h. After additional inspection, she realized it was an extra report from one of their file systems that had been discarded. What should Denise do?
Computers and Technology
1 answer:
Fed [463]3 years ago
3 0

Answer:

All of the above

Explanation:

The report is a piece of critical information in the company's file system that should be saved and secure from adversaries. All the options should be implemented to prevent and manage data leakage.

You might be interested in
To defeat SQL injection attacks, a web application has implemented a filtering scheme at the client side: basically, on the page
gayaneshka [121]

It is possible to bypass this, so therefore, this isn't the solution to completely defeat SQL injection attacks.

8 0
3 years ago
Choose all items that represent features of the job application process
oksano4ka [1.4K]

Where are the Options

6 0
3 years ago
With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
Nana76 [90]

Answer:

Attached are the excel screenshots

3 0
4 years ago
Which part of the computer coordinates all computer operations and performs arithmetic and logical operations on data
allochka39001 [22]

Answer:

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s.

5 0
3 years ago
For homework, we were given this photo and to figure out what it is. It is up close and labelled “ too close to tell” but I have
dalvyx [7]
I honestly have no idea on what this is... but im guessing its some sort of tool or food in somebodys mouth... probably isn't but oh well..
7 0
3 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • Tiff is the default file format for most digital cameras. <br> a. True <br> b. False
    12·1 answer
  • How can a user begin working with a new, blank workbook in Excel?
    10·1 answer
  • Which statement is most likely to be true about a computer network?
    11·2 answers
  • While editing a film, a director feels that the actors have not enacted a particular scene well. What type of shot must the dire
    12·1 answer
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • Take points for free who are new and enjoye them
    9·2 answers
  • Write down the different types of testing with their definition.
    11·1 answer
  • Can someone please help me? (,:
    14·1 answer
  • What's good computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!