1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
4 years ago
13

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra

nsmission, via the application of policy, education, training and awareness, and technology is known as ___________.
Computers and Technology
1 answer:
Sergeu [11.5K]4 years ago
8 0

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

You might be interested in
What of the following can a cell contain? A number a word a function of these
EastWind [94]
A function of these
8 0
3 years ago
Please write me a one-paragraph summary of what you have learned about space technology.
kow [346]

Answer:

Space technology. Space technology is technology developed by space science or the aerospace industry for use in spaceflight, satellites, or space exploration. Space technology includes spacecraft, satellites, space stations, and support infrastructure, equipment, and procedures and space warfare. Launched into orbit in 1990, the Hubble truly is one of the greatest space instruments in the history of humanity. And it has been updated significantly in the twenty-first century. But the truth is, space exploration technology, and other discoveries and technologies that arise because of it, are incredibly influential and beneficial; not only does space research improve the economy by keeping scientists and engineers employed

Explanation:

5 0
3 years ago
LIST THE SKILLSET NEEDED FOR BECOMING A PROGRAMMER.
wolverine [178]

Answer:

Proficiency with programming languages.  

Learning concepts and applying them to other problems.  

Mathematical skills.  

Problem-solving capability.  

Communication skills.

Writing skills.  

Inquisitiveness.  

Self-motivation.

7 0
3 years ago
Consider a scenario in which Host A wants to simultaneously send packets to Hosts B and C. A is connected to B and C via a broad
Ksenya-84 [330]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Anyway, after getting acknowledgment from B, C and D will A immediately send a package here. So that we can establish a procedure whereby A must wait until all three acknowledgments are provided.

Start waiting for the specified scenario or situation:

⇒ For sender (sender is A here):

Keep the following steps repeated before all packets are shipped out.

  • Step 1 : Place in the broadcast network a fresh packet and configure the wait bit= 1 and the ack bits= 000 and begin the timer (t=0). While bit allows while for the sender(A) to deliver the next packet. Ack parts will hold the earned acknowledgments until now. When first bit= 1 then ack obtained from B, if second bit= 1 then ack obtained from B and instead ack collected from D if the last bit= 1.
  • Step 2 : Once sender(A) receives a new acknowledgment, change the ack bits through generating the resulting bit= 1.
  • Step 3 : Test if bits of the ack = 111 otherwise render a bit of wait = 0. Go so far as to step 1 and proceed to step 2.
  • Step 4 : Whether A has been waiting for t= t0 time and therefore not gotten at least one ack, then place a certain packet on the channel and make t=0, ack bits= 000 and start preparing bit= 1. Then move forward with step 2.

⇒ For receiver (receiver are B, C and C here):

  • Step 1 : Wait for another package.
  • Step 2 : On delivery of the new document, send ack to the provider and begin countdown t = 0.
  • Step 3 : When no latest packet arrives in t= t0 time then give the existing packet acknowledgment again. As it indicates the channel ack may be missing.
  • Step 4 : Taking a move to 1.

7 0
4 years ago
The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is
kupik [55]

Answer: Remote Login

Explanation:

The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is technically the same as the REMOTE LOGIN, only with the added burden of transmitting over an insecure network.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the sh
    7·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • How to revive a computer if it functions in an unexpected manner?
    9·1 answer
  • Kandi recently started working at new job and must become familiar with her computer. If she would like to view what software ha
    12·1 answer
  • A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.
    8·1 answer
  • A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg c
    15·1 answer
  • what are examples of conditional formatting tools? check all that apply. color scales, icon sets,data bars,cell styles,themes
    8·1 answer
  • Given a sorted list of integers, output the middle integer. Assume the number of integers is always odd. Ex: If the input is: 2
    13·1 answer
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!