answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
2 years ago
8

Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr

inciples? A. Reliability, Scalability, and Portability B. Interoperability C. Security D. Resilience and Redundancy
Computers and Technology
1 answer:
Viktor [21]2 years ago
4 0

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

You might be interested in
Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested d
IrinaVladis [17]

Answer:

if-elif-else                                            

Explanation:

In Python if condition is used to decide whether a statement or a block of statements is to be executed or not based on the condition, if the condition evaluates to true then the block of statements is executed and if the condition is false then it is not executed.

Sometimes we need to execute some other statement when the condition is false. For example

if (number1 <= number2)

print (number1,  "is the smallest")

Lets suppose we want to print another statement if this condition evaluates to false. If the condition gets false then the following message should be displayed:

print(number 2, "is the smallest")

For this purpose else statement is used along with if statement to execute the block of code when the if condition evaluates to false.

if (number1 <= number2)

print (number1,  "is the smallest")

else:

print(number 2, "is the smallest")

Now what if there are three numbers or more numbers to be compared in order to identify the smallest number from the given numbers. So in this case we have multiple options to be checked. else statement will not be enough a  for else there can be at most one statement. With if elif else multiple conditions can be checked and if any of the condition evaluates to true then its block of code is executed and if none of the condition is true then the last else statement will be executed.

For example:

if (number1 <= number2) and (number1 <= number3):

print (number1,  "is the smallest")

elif (number2 <= number1) and (number2 <= number3):

print (number1,  "is the smallest")

else:

print (number3,  "is the smallest")

In this example number1 is compared to number2 and number3. If both numbers are less than number1 then the program control goes to elif statement where number2 is compared to number1 and number3. if this condition is false too then the final else part will be printed which is that number3 is the smallest.

Take another example where there are more number of expressions to be checked.

val = 50

if (val == 40):  

   print ("value is 40")  

elif (val== 35):  

   print ("value is 35")  

elif (val == 25):  

   print ("value is 25")  

elif(val==15):

    print ("value is 15")  

else:  

   print ("value is not present")

This will output the else part value is not present, because none of the condition evaluates to true.

7 0
2 years ago
How many bits would be needed to count all of the students in class today? There are 5 children in the class.
zavuch27 [327]

Answer:

You would need 8 bits.

Explanation:

If your refer back to the binary system, the exponent 2^3 would equal 8, and since there are only 5 children, this would be more reasonable. It's better to have a little bits left over than too many. Hope this helps!

4 0
2 years ago
1. In the Entity-Relationship Model, relationships can have attributes.
Vladimir [108]

Answer:

1. A. True

2. A. True

3. B. Conceptual.

4. Three (3).

Explanation:

An Entity-Relationship Model is used in databases to describe the structure and relationship between data elements known as entities.

1. True: In the Entity-Relationship Model, relationships can have attributes.

2. True: Attributes are the smallest division of data in ER diagram.

3. Conceptual: the level of abstraction which the Entity-Relationship Model most concerned with.

4. Consider the following relationship involving two entities, students and classes: A student can take many classes. A class can be taken by many students. The number of tables which can be used to represent this relationship in a schema is 3 because we are having three (3) parameters which are simply the students and the two entities.

In database management, the term "schema" is used to denote a representation of data.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

5 0
2 years ago
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
2 years ago
Which data table display compares report metrics to the website average?
lozanna [386]
The appropriate response is Pivot. Correlation shows a bar graph plotting the execution of the chose measurements in respect to the site normal. Turn tables are not made naturally. A rotate table enables you to separate the essentialness from a vast, point by point dataset.
3 0
2 years ago
Other questions:
  • For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distribute
    6·1 answer
  • 1. Consider a client and a server connected through one router. Assume the router can start transmitting an incoming packet afte
    13·1 answer
  • Meadowdale Dairy Farm sells organic brown eggs to local customers. It charges $3.25 for a dozen eggs, or 45 cents for individual
    6·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • Mike has never used a slide software before, but he needs to create a presentation by the end of the week. what recourse would b
    8·1 answer
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
    5·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • What should businesses do in order to remain competitive under the current Cloud<br> landscape?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!