1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
8

Provide an example by creating a short story or explanation of an instance where availability would be broken.

Computers and Technology
1 answer:
ryzh [129]3 years ago
6 0

Incomplete/Incorrect question:

Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​

<u>Explanation:</u>

Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.

For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend

s without the consent of the celebrity.

You might be interested in
Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
kondaur [170]

Answer:

#include <iostream>

#include <vector>

using namespace std;

void swapFrontBack(vector<int>& nums) {

if(nums.size() < 2) {

return;

}

swap(nums[0], nums[nums.size()-1]);

}

void printit(vector<int>& arr) {

for(int i = 0; i < arr.size(); i++) {

cout << arr[i] << " ";

}

cout << endl;

}

int main() {

vector<int> num1;

swapFrontBack(num1);

printit(num1);

num1.push_back(1);

swapFrontBack(num1);

printit(num1);

num1.push_back(2);

swapFrontBack(num1);

printit(num1);

vector<int> num2(10, 1);

num2[9] = 2;

swapFrontBack(num2);

printit(num2);

return 0;

}

Explanation:

4 0
3 years ago
What are the OSHA construction standards also called ?
Zarrin [17]
Part 1926 & Part 1910


hope this helps 

5 0
3 years ago
Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
Archy [21]

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

5 0
1 year ago
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. For example, 19 yields
Alex Ar [27]

Answer:

Written in Python:

dollars = int(input("Amount: "))

numFive = int(dollars/5)

numOnes = dollars%5

print(str(dollars)+" yields "+str(numFive)+" fives and "+str(numOnes)+" ones.")

Explanation:

This line prompts user for input

dollars = int(input("Amount: "))

This line calculates the number of 5 that can be gotten from the input. This is done using integer division

numFive = int(dollars/5)

This line gets the remaining ones. This is done by using the modulo sign to get the remainder when input is divided by 5

numOnes = dollars%5

This line prints the required output

print(str(dollars)+" yields "+str(numFive)+" fives and "+str(numOnes)+" ones.")

4 0
3 years ago
Other questions:
  • Explain free space allocation?
    9·1 answer
  • Based on the type of document you want to create, you must first select the page
    15·2 answers
  • In Java please.
    13·1 answer
  • Assume you need to declare a type parameter that can represent any type that implements the interface Comparable. Which type par
    15·1 answer
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • What is the google search operator that limits results to a specific domain?
    8·1 answer
  • Which sentence is an example of an I-statement?
    6·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Please help with my Python code - Functions
    6·1 answer
  • ____coping skills are instinctive.<br> A. All<br> B. No<br> C. Some
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!