1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
8

Understanding that protection of sensitive unclassified information is:

Computers and Technology
1 answer:
AfilCa [17]3 years ago
4 0

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

You might be interested in
What tool is used to find and organize files on a mac
Margaret [11]

Answer:

the tool is literally called <u><em>The Finder.</em></u>

Explanation:

hope this helps

4 0
3 years ago
The same student is curious about how a Web site appears on his computer screen. On a separate piece of paper, draw and explain
Ksivusya [100]

Answer:

HTTP is the application layer protocol required.

Explanation:

For a web page to be displayed on a browser, the seven layers of the OSI model work together. On the application layer, HTTP protocol is used to communicate between the server and the client. The HTTP client is the browser (Chrome, Internet Explorer, Firefox etc.) which sends a request to the HTTP server for accessing a web page.  

When a URL is accessed, the HTTP client sends a request to the HTTP server. The server locates the file which is being requested and sends a response message containing the web page which is to be displayed. The exchange of data between the HTTP client and server takes place over a TCP connection.

TCP is a transport layer protocol which provides a reliable connection over which the exchange of data takes place. Data at the transport layer is sent in the form of segments. If the data being sent from the server is too long, it is divided into multiple segments and sent one after the other. The client is then responsible for joining the segments and displaying the information as a web page. The transport layer is also responsible for error correction and detection during the communication process.

If the student is sending or retrieving information from a secure website, the messages being exchanged between the client and server will be encrypted. This means that if a third-party tries to tap the communication process, they would not be able to decipher the messages. This increases the security and helps keep the information present on the web page confidential.

8 0
3 years ago
Given f(x) = -2x2 + 5x - 1 and g(x) = 3x + 4 determine a simplified
lukranit [14]

Answer:

-6x^4 + 7x^3 + 17x^2 -4x

Explanation:

( f x g )( x )

Substitute

[( -2x^2 + 5x -1 )( 3x + 4 )]( x )

Use the Distributive Property

[-2x^2( 3x) + 5x( 3x) - 1( 3x) -2x^2( 4) + 5x (4) -1 (4)] (x)

Simplify

( -6x^3 + 7x^2 + 17x -4)(x)

Distributive Property

-6x^4 + 7x^3 + 17x^2 -4x

7 0
3 years ago
A​ _______ variable is a variable that has a single numerical​ value, determined by​ chance, for each outcome of a procedure.
7nadin3 [17]
Single variable is the answer
5 0
3 years ago
What is File Allocation Table
vichka [17]
It's how you format your hard drive
4 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it important to ask an interviewer at least one question at the end of an interview?
    12·2 answers
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • The mathematical constant Pi is an irrational number with value approximately 3.1415928... The precise value of this constant ca
    12·1 answer
  • An organization is trying to decide which type of access control is most appropriate for the network. The current access control
    12·1 answer
  • Which route of entry could chemicals use to enter through the body’s airways?
    8·1 answer
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • Vpn stands for _____. very precise settings virtual private network virtual public network vice prestigious setup
    5·1 answer
  • Choose and explain, step by step, one method of backing up student files either manually or using a cloud service.
    10·1 answer
  • A computer has dose not have ___________
    6·2 answers
  • What are some qualities of a good game critic? What are some qualities of a bad game critic?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!