answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
2 years ago
7

Penelope learned of a new program that would help her company keep track of their inventory more efficiently. She sent an e-mail

to the inventory control manager to share this information. She also wanted to send a copy of her message to the company's purchasing manager. To send the message to the purchasing manager, Penelope most likely clicked on this button.
Computers and Technology
1 answer:
Lady bird [3.3K]2 years ago
4 0
Cc or carbon copy i think 
You might be interested in
What is computer? Explain the characteristics of computer.<br>​
Misha Larkins [42]

Answer:

What Is Computer? Here's Why: The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed. A powerful computer is capable of performing about 3-4 million simple instructions per second.

Explanation:

6 0
2 years ago
Imagine a business where there are no clear boundaries defined for data and systems ownership. As a security professional, descr
laiz [17]

Answer:

Loss of confidentiality, integrity and Availability

Explanation:

First I would start by explaining data ownership and system ownership

<u>Data ownership</u>:

Such an owner is responsible for safeguarding data, has all rights and complete control of the data. He or she can transfer data responsibility to someone else

<u>System ownership</u>:

The responsibility here is system maintenance, taking care of system functionalities, updating system and system software.

<u>Lack of data ownership</u>:

1. This affects privacy of data as there would be no one involved in the monitoring and taking care of the data. It would be at risk as sensitive information may get out and data may even be modified.

2. Lack of data ownership could bring about inconsistency in data

3. Lack of data ownership piles up risks to data which may cause great loss to data eventually.

<u>Lack of system ownership</u>:

1. There would be no one available to take care of issues that may come up with the system

2. If system gets to be outdated, it becomes open to malware and hackers

3. Work will be unable to be completed on the system.

<u>Loss of CIA triad</u>

CIA stands for confidentiality, Integrity and Availability

1. Without data ownership there would be access to data which is unauthorized. This brings about loss in confidentiality, and there could be issues with data availability

2. If system gets malware at the absence of system owner then there would be loss in confidentiality, integrity. Hackers would take control of the system and they would be able to use data.

3 0
2 years ago
What infrastructure model provides access to shared computing resources over a network, often the internet?
Goshia [24]
Cloud computing infrastructure model provides access to shared computing resources over a network, often the internet. The cloud computing infrastructure is a virtual infrastructure composed of hardware and software components <span>needed to support the </span>computing<span> requirements of a </span>cloud computing model.And the cloud computing model is <span>the delivery of computing services (servers, storage, databases, networking, software, analytics and more) over the Internet .</span> 
7 0
2 years ago
How many solutions exist for the given equation?
vovikov84 [41]
Infinity amount of answers because each side can be simplified to x making any solution correct
6 0
2 years ago
Your computer has a quad-core processor that supports multithreading installed. given that the system is running windows, how ca
AlexFokin [52]
By using cpu-z or the performance ran in taskmgr
8 0
2 years ago
Other questions:
  • 7. Test Average and Grade Write a program that asks the user to enter five test scores. The program should display a letter grad
    15·1 answer
  • Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111
    12·1 answer
  • He volume of a sphere is 4/3πr3, where π has the value of "pi" given in Section 2.1 of your textbook. Write a function called pr
    5·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • Team A found 342 errors during the software engineering process prior to release. Team B found 184 errors. What additional measu
    12·1 answer
  • Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
    8·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document again?
    12·1 answer
  • Consider the method total below: public static int total (int result, int a, int b) {     if (a == 0)    {      if (b == 0)     
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!