1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
9

Can 7Cs help to develope an effective document?

Computers and Technology
1 answer:
zvonat [6]3 years ago
8 0

Answer:

i dont know k srry

Explanation:

You might be interested in
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Ep-34 where should you aim a fire extinguisher's stream when extinguishing a fire?
patriot [66]
When extinguishing a fire, the extinguisher's stream should be aimed at the base of the flame using a sweeping motion. This will allow one to kill the fire from the source. This will quickly put out the fire faster applying the extinguisher from the upside.
8 0
4 years ago
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
1. What is the connection between a credit report and a credit score?
viktelen [127]

Answer:

<em>Credit report: A credit report is a record of a consumer's credit history and serves as credit references. Credit score: A credit score is an algorithm that measures your credit risk based on the information in your credit report at one point in time.</em>

Hope this helps!!

5 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • What is Boolean algebra
    14·2 answers
  • In printing systems using ____, a disk accepts output from several users and acts as a temporary storage area for all output unt
    14·1 answer
  • Which statement regarding socializers is true?
    10·2 answers
  • Which example task should a developer use a trigger rather than a workflow rule for?
    11·1 answer
  • Write a C++ program that reads a temperature value and the letter C for Celsius or F for Fahrenheit. Print whether water is liqu
    14·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • Ms office suite comes with its own set of pictures in the​
    5·1 answer
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    11·1 answer
  • Debate whether social networking is harmful or helpful to society.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!