1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
11

What should be taken into consideration when determining which critical information should be protected?

Computers and Technology
1 answer:
Korolek [52]3 years ago
4 0

Answer:

What data would cause harm if exposed to adversaries, the type of threats, risks, and vulnerabilities.

Explanation:

Operations security (OPSEC) is a process or method organizations use to analyze or assess data to be protected to prevent data leaks that would cause harm to their activities.

It is always important to determine critical information that should be confidential to the organization as well as potential risks, threats and vulnerabilities in the company.

You might be interested in
It is possible to turn extrinsic factors into intrinsic motivators. true or false
anygoal [31]
Definitely true. People who, for example, grew up homeless can use that as motivation to work harder in life.
8 0
3 years ago
Read 2 more answers
Can any existing directory beneath the system root directory be used as a mount point?
musickatia [10]
<span>Yes.
   A mount point mounts a capacity gadget or filesystem, making it available and appending it to a current registry structure.
    While an umount point "unmounts" a mounted filesystem, illuminating the framework to finish any pending read or compose activities, and securely confining it.</span>
7 0
3 years ago
What do you think about the argument that word processing reduces the quality of writing?
slava [35]
<span>I believe when you're given a sufficient amount of time you are able to write your thoughts clearly than when you're given a short period of time to answer questions or make an argument on an essay BUT there is a drawback with the tools within the word processing. Word processing comes with a spell check but it does not correct homonyms such as they're, their and there or other homonyms. My experience with word processing is that I always need time to effectively write something and that helps me make less grammatical mistakes when I take my time to write and edit my paper, I guess it all depends on the individual in their writing skills

I hope this helps!
</span>
5 0
4 years ago
Write a program that asks the user to enter two numbers,obtains the two numbers from the user and prints the sum,product,
Andru [333]

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   //initialization

   float a1,a2;

//display the message

cout<<"Enter the first number: ";

   cin>>a1;  //store the value

   cout<<"Enter the second number: ";

   cin>>a2;   //store the value

   //display the calculation result

   cout<<"The sum is: "<<a1+a2<<endl;

   cout<<"The Subtraction is: "<<a1-a2<<endl;

   cout<<"The product is: "<<a1*a2<<endl;

   cout<<"The Quotient is: "<<a1/a2<<endl;

}

Explanation:

Create the main function and declare the two variables of float but we can enter the integer as well.

display the message on the screen and then store the input enter by the user into the variable using the cin instruction.

the same process for second input as well, display the message and store the input.

after that, print the output of the calculation. the operator '+' is used to add the two numbers like a1+a2, it adds the number stored in the variable.

similarly, the subtraction operator is '-', product '*' and quotient operator '/'.

and finally, we get the desired output.

4 0
3 years ago
What does “modulate your voice” mean?
Pachacha [2.7K]
A) when u modulate some thing you vary it
5 0
3 years ago
Other questions:
  • Nonvolatile in the context of data storage means ________________. a. the data can't be changed in a data warehouse. b. the data
    11·1 answer
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • ICT excel data homework
    10·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML<br><br><br>​
    10·1 answer
  • Any Danganronpa fans around here? I'm bored.
    13·2 answers
  • (ORAL COMMUNICATIONS)- I just need someone to please check if my answers are correct, and if not, please correct me :)
    8·1 answer
  • What is the definition of shape
    14·2 answers
  • Can someone please help me with this .
    11·1 answer
  • Explain two protocols to enhance cellular networks capacity?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!