1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
9

Dragging a mouse over text is called

Computers and Technology
1 answer:
Fantom [35]3 years ago
8 0

Answer:

typing

Explanation:

You might be interested in
Inputs to a system that can enhance performance is called
disa [49]
Inputs to a system that can enhance performance is called Resources
6 0
3 years ago
Read 2 more answers
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and s
Akimi4 [234]

Answer: (a) Target had security software, but the notification alerts from the software were  ignored.

Explanation:

The security software was there in target but its notification alerts being ignored was something which was not thought to have been occurred during the Target security breach, as anyone could be alerted with the notification alert.

6 0
3 years ago
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
What traditional responsibilities are removed from an organization when moving to a cloud provider?
Black_prince [1.1K]

The traditional responsibilities removed from an organization when moving to a cloud provider includes;

  • Cloud provider providing system maintenance rather than IT personnel.
  • Responsibility for the provision of storage space will be borne by the cloud provider.
  • The provision of the required level of performance of shared IT hardware.
  • Provision of security for the organization's data will be partly shared.
  • Provision of capital for upgrade and expansion.
  • Reduced responsibility for the provision of space and hardware Universal access route to company sites.

Reasons:

The maintenance of the systems traditionally performed by the

organization is  carried out by the cloud provider.

The storage space requirements for files and shared document are

provided by the cloud provider which results in increased collaboration.

Along with the changing landscape of technology, the cloud provider

ensures the optimum performance IT hardware that is shared by the

employees of the organization.

The Cloud provider ensures the security of the data stored on the cloud as

it is accessed from different devices.

The capital requirement for expansion is borne by the provider

With the use of cloud services, employees can work from home and other

remote locations.

Learn more about cloud services here:

brainly.com/question/25602226

5 0
2 years ago
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
4 years ago
Other questions:
  • For each of the following six program fragments: a) Give an analysis of the running time (Big-Oh will do). b) Implement the code
    5·1 answer
  • How do you think computers have helped to improve documentation, support and services within the healthcare industry.
    7·1 answer
  • In Windows, the log that stores events from a single application or component rather than events that might have system wide imp
    14·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accompl
    11·1 answer
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • 2.
    11·1 answer
  • In the world of computer languages, whats the most popular language?
    13·1 answer
  • To improve readability and maintainability, you should declare ________ instead of using literal values such as 3.14159.
    14·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!