answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
2 years ago
8

Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr

inciples? A. Reliability, Scalability, and Portability B. Interoperability C. Security D. Resilience and Redundancy
Computers and Technology
1 answer:
Viktor [21]2 years ago
4 0

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

You might be interested in
Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
Gnom [1K]

Answer:

Following are the code in the Java Programming Language:

try{  //try block.

processor.process();  // call the function through the object.

}

catch(Exception e){  //catch block .

System.out.println( "process failure");   //if any exception occurs then print.

}

Explanation:

In the following code, we set two blocks in Java Programming Language of the exception handling which is try block or catch block.

  • In try block we call the function "process()" through the "processor" object.
  • If any exception occurs in the program then the catch block print the following message is "process failure"
6 0
1 year ago
If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
Alenkinab [10]

Answer:

Continuous Integration tool is used to address the issue of separate features branch of program.

Explanation:

Continuous integration process comprise of three main objectives such as improvement, delivery and development of the software. In contentious integration tool all the people  three objective specialist are work together to make program better.

Continuous integration is a platform that is used to detect the problems in a code that need to be corrected. The code is store in the repository of the tool that needs correction. The reviewers review the code in different portions of the code and identify and resolve the problem. There are multiple contributors to correct the code.

8 0
1 year ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
1 year ago
Write the prototype for a function named showSeatingChart that will accept the following two-dimensional array as an argument. c
barxatty [35]

Answer:

See explaination

Explanation:

void showSeatingChart(string seatingChart[20][40], const int ROWS, const int COLS){

for(int i = 0;i<ROWS;i++){

for(int j = 0;j<COLS;j++){

cout<<seatingChart[i][j]<<" ";

}

cout<<endl;

}

}

4 0
2 years ago
A hawk swoops down and catches a squirrel. The squirrel provides energy for the hawk. What happens to the rest of the matter?
marishachu [46]
The matter is converted to other carbon molecules
6 0
1 year ago
Read 2 more answers
Other questions:
  • A ____ resembles a circle of computers that communicate with each other.
    14·1 answer
  • QUESTION 2 of 10: New shoes are on SALE. You find a pair you like for $85 dollars. But you only have $45 with you. So, you pay $
    13·1 answer
  • Address the FIXME comments. Move the respective code from the while-loop to the created function. The add_grade function has alr
    14·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • Every employee of your company has a Google account. Your operational team needs to manage a large number of instances on Comput
    10·1 answer
  • A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a compute
    7·1 answer
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • While adding voices to an animation, what kind of room should you choose?
    11·1 answer
  • Organizations that have no physical ("brick and mortar") presence, but only exist because of communication and computer technolo
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!