1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
2 years ago
10

The most significant concerns for implementation of computer technology involve _______, security, and ethics. accuracy property

privacy access
Computers and Technology
1 answer:
max2010maxim [7]2 years ago
8 0

Based on computer technology analysis, the most significant concerns for implementing computer technology involve <u>Privacy</u>, security, and ethics.

<h3>What is Privacy in Computer Technology?</h3>

Privacy is one of the major issues in computer technology. It deals with keeping data and information safe and protected from—unauthorized access.

Privacy issues affect individual users, as well as companies, states, and nations.

Hence, in this case, it is concluded that the correct answer is Privacy.

Learn more about Privacy in Computer here: brainly.com/question/13165806

You might be interested in
No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have vi
My name is Ann [436]

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
4 0
3 years ago
To recover a deleted document, what would you choose in the info window?
Natasha2012 [34]
"Restore", or in Spanish, "Restaurar".
7 0
4 years ago
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
Convert the following decimal numbers into binary numbers. <br><br>pls ASAP<br>​
Anna007 [38]

Explanation:

Given, the cost price of the TV is Rs 24600. Now, the cooler costs Rs 800 more than one-third of the TV. The cost price of the cooler is Rs 9000.

6 0
3 years ago
Help, with gaming unlocked
Leto [7]

Answer:

C. empathic understanding

8 0
4 years ago
Other questions:
  • A(n) _____ of an class is where the services or behaviors of the class is defined. (Points : 6) operation
    6·1 answer
  • Artie believes that all Asian people are more intelligent than other people. Artie is engaging in?
    12·2 answers
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    10·1 answer
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • Discuss how does a Modulus Operator function
    7·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • assume a class named window has an accessor method named getwidth that accepts no parameters and returns an int. assume further
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!