Integrity broadly means limiting disclosure of information to authorized individuals. For example, if the principle of integrity is applied to e-mail, then you might have an objective of ensuring that all sensitive information be protected against eavesdropping. And then to implement this objective you would require that all e-mails containing sensitive information be encrypted, and then ensure that only authorized individuals have access to the decryption key. True or False?

Answers

Answer 1

Answer:

t doesnt work

Explanation:


Related Questions

Let's apply: Interpret these electrical wiring plans. Write your answer in the answer sheet.

Answers

es itmage cnontinee tu espuestraa

HELP ASAPPPPPPPPPPP
PLESS
3
Which of the following myths is referenced in the Bible, the Koran, the Book of Kings, and the Constitution of Ethiopia?

a) Jason and the Golden Fleece
b) The Queen of Sheba
c) King Arthur
d) Shangri-La

Answers

Answer:

c

Explanation:

King Arthur was a king along with the other kings as a tale

I dont understand this at all! PLZ help me

DO NOT ENTER CODE INTO THE COMPUTER! What will be printed by each of the print statements in the following code with this list

 ex = [5, 3, 0, 1, 2]

Answers

Answer:

See explanation

Explanation:

Given

[tex]ex = [5,3,0,1,2][/tex]

Solving (a):

print(ex[0:2])

This prints the elements from 0 index to 2-1

In other words, it prints index 0 and 1

Hence, the output is [5, 3]

Solving (b):

ex.append(8) --> This adds 8 to the end of the list

print(ex) --> This prints the updated list: [5, 3, 0, 1, 2, 8]

Solving (c):

ex.remove(0) --> This removes 0 from the list

print(ex) --> This prints the updated list: [5, 3, 1, 2, 8]

Solving (d):

ex.pop() --> This removes the last ite, from the list

print(ex) --> This prints the updated list: [5, 3, 1, 2]

The students of a college have to create their assignment reports using a word processing program. Some of the questions in their assignment involve comparison between different items. Which function of a word processing program will be the most useful to present this information?

Answers

Answer:

The insert table function of a word processing program will be the most useful for comparison.

Explanation:

Your welcome! :)

A person's alcohol or drug addiction____devastate the lives of those nearby.
A. is sure to
B. it unlikely to
C. doesn't

Answers

Answer:

A. is sure to

Explanation:

Alcholism affects not only your body but the people around you, due to how it can alter your behavior

Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording to what you have learned in the lesson.

Answers

Full question attached

Answer and Explanation:

1. There’s need to ask for help and advice from people who have the

knowledge and skills in making a simple electrical gadget.

2. Adapter is used to plug appliances that are far from the main power source.

3. Do not touch the metal pipes while you are doing electrical repairs.

4. Shut off the power at the main switch or circuit breaker and unplug the equipment when working on electricity.

5. Pliers are tools used to grip, pull or cut electric wires.

From the above, we have corrected some of the errors that could be made in everyday home appliances or home electricity. In number 4, it is also worthy of note that shutting off power at the main switch will only require emergency situations otherwise we need only shut off the one for the problem circuit and leave the rest.

A _____ movement tries to improve a part of society, usually through legal methods.

Answers

Answer:

Revisionary

Explanation:

Which is developed during the process of technological design?

Answers

Answer:Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

:)

Answer:Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. Some of the codes and their meanings are listed below: C++

200, OK (fulfilled)

403, forbidden

404, not found

500, server error

Given an int variable status, write a switch statement that prints out the appropriate label from the above list based on status.

I'm getting an error on this.

This is my code:


cout << "Enter a status";

cin >> status;

switch (status)

{

case 200:

break;

case 403:

break;

case 404:

break;

case 500:

break;

}

Answers

Answer:

the answer is your mind think and you will get it like me it's ()

Select the correct answer. Dave uses a Windows operating system. He plans to host his blog on a web server. Which server software should Dave use?
А. Klone
B. Nginx
с. IIS
D. Apache HTTP​

Answers

Answer:

C. Linux

Explanation:

The kernel of the Linux and the utilities of the GNU are open and free of cost. One can directly download and install GNU/Linux without buying. Thousands of programs in software packages are available that can be easy to install without paying anything. There are many software programs, games in Linux that are free of cost and are open source that means anyone can download and install.  

Answer:

C - IIS

Explanation:

Just got this one right on Plato

Jijijiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Answers

Answer:

add me as a friend:)

Answer:

heeeeeeeeeeeeeeeeeeeeeeeehhhhhhhhhhhhhhhheeeeeeeeeeeeeeeeeeeeeeee

have a good day :)

Explanation:

((GUITAR))
What is the letter name for the note shown above?

D
E
F
G

Answers

It is Letter G
Explanation: Took Guitar classes as a kid and memorized the letters.

3.1.1 What type of goods are car radio and remote control.​

Answers

Answer:

Radio Controlled cars .

Which of the following type of software would be the MOST appropriate for showing information in tables and reports

Answers

Answer:  B) Database Software

Explanation:

Desktop Publishing software and Multimedia software is not used for storing data, so it can't be that. Spreadsheet software stores data in cells, while Database software stores data in tables.

A web designer finds out after the launch that one of the external links did not have "http://' and therefore the link appeared broken to the user.
Which phase of QA could have corrected this issue?
OA wireframing
OB.
need testing
OC. design testing
OD. usability testing

Answers

Answer is oc design testing

1) A.B+B.C.A.D+A.D
2) A.D+B.C+A.C.B.C.D
3)B.C+A.C.B+A.D​

Answers

Explanation:

Draw AE⊥BC

In △AEB and △AEC, we have

     AB=AC

     AE=AE                     [common]

and,  ∠b=∠c       [because AB=AC]

∴  △AEB≅△AEC

⇒ BE=CE

Since △AED and △ABE are right-angled triangles at E.

Therefore,

     AD2=AE2+DE2 and AB2=AE2+BE2

⇒ AB2−AD2=BE2−DE2

⇒ AB2−AD2=(BE+DE)(BE−DE)

⇒ AB2−AD2=(CE+DE)(BE−DE)    [∵BE=CE]

⇒ AB2−AD2=CD.BD

   AB2−AD2=BD.CD      

A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications. You have launched the CloudHSM cluster but after just a few hours, a support staff mistakenly attempted to log in as the administrator three times using an invalid password in the Hardware Security Module. This has caused the HSM to be zeroized, which means that the encryption keys on it have been wiped. Unfortunately, you did not have a copy of the keys stored anywhere else.

How can you obtain a new copy of the keys that you have stored on Hardware Security Module?

Answers

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Botnets can be defined as Group of answer choices Redirecting web links to addresses different from the intended one, with sites masquerading as the intended destinations. Encryption methods widely used in e-commerce. Eavesdropping programs that monitor information traveling over networks. A network of zombie computers infiltrated by malware used to carry out a distributed denial-of-service attack.

Answers

Answer:

A network of zombie computers infiltrated by malware used to carry out a distributed denial-of-service attack.

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Botnets can be defined as a network of zombie private computers (PCs), smartphones, servers, etc., infiltrated and infected by malware used to carry out a distributed denial-of-service (DDOS) attack without the owner being aware. Thus, botnets are typically used by hackers to remotely steal user data, perform a distributed denial-of-service (DDOS) attack, and send spam messages via a command and control (C&C) channel (software).

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

Some examples of an antivirus utility to scan, detect, remove and prevent botnets are Avast, Norton, Kapersky, McAfee, etc.

In an online shopping application, the primary case type PurchaseOrder has two child case types: Payment and Packaging. In processing PurchaseOrder case PO-11, Payment case Pay-37 and Packaging case Pac-56 are created. Which statement about the processing of PO-11, Pay-37, and Pac-56 is correct?
A. PO-11 has to be resolved before either Pay-37 and Pac-56 is resolved.
B. Pac-56 has to be resolved before Pay-37 is resolved.
C. Both Pay-37 and Pac-56 have to be resolved before PO-11 can be resolved.
D. PO-11 can be resolved when either Pay-37 or Pac-56 is resolved.

Answers

Answer:

The answer is "Option C".

Explanation:

The principal instance type PurchaseOrder has two types of instance children in an online purchasing application: Pay and Packing. Pay case Pay-37 and packing instance Pac-56 are designed to Sales Orders case PO-11 execution. All statements regarding PO-11, Pay-37, and Pac-56 should be settled before PO-11 may be addressed. Both Pay-37 and Pac-56.

Check out this app! It's millions of students helping each other get through their schoolwork. https://brainly.app.link/qpzV02MawO ​

Answers

Answer:

Tamam hocam o zaman....

One way parents and guardians can influence technology use is to establish set boundaries and model proper use for their children. Which of these outcomes would you expect if this guideline was followed?

Answers

Answer: Adults and children would look at things online together

Explanation:

Despite the many advantages that technology possesses, it can be dangerous when it's left all alone with children without proper monitoring.

There should be set boundaries and there should be proper use being modelled for their children. To do this, it's essential for the adults and the children to look at things online together.

Andy needs to rank the pages of his website according to importance. What tag will he use on the site map?
Andy will use the ____
tag to rank the pages of his website.

Answers

Answer:

tag. Title tags are used to set up those clickable headlines that you see in the SERP: ...

Meta description tag. ...

Heading (H1-H6) tags. ...

Image alt text. ...

Schema markup. ...

HTML5 semantic tags. ...

Meta robots tag. ...

Canonical tag.

Answer: the priority tag

Explanation:

edmentum

Read the thesaurus entry for channel. Then, use the drop-down menus to pick the synonym that best fits each sentence.

She was the first swimmer to cross the
between the two countries.

If you want your complaint to be addressed, you need to go through the appropriate

Answers

Answer:

The answer is "strait  and route"

Explanation:

It was the first swimmer between the 2 nations to cross the STRAIT.

It must pass the appropriate route if your complaint is to be addressed.

Answer:

strait and route

Explanation:

Charles accessed a website for a research paper and recorded the information below.

Title of Website:
The Fall of Rome
Title of Article:
Military Forces
Author:
Marian Shelby
Publisher:
Unknown
Date Accessed:
October 14, 2012
Date Published:
March 11. 2009
Format:
Web

According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?

Answers

Answer:

The answer is D

Explanation:

The MLA citation for Charles will be:

shelby, marian. “the fall of rome.” military forces. n. p., 11 mar 2009. web.

14 oct 2012.

What is a citation?

A citation is given as the mentioning of the work from a book, paper, or other author's work. The citation involves the details of the article with its author and other publications in varying formats.

The MLA format of citation is given as:

Last name of author, first name of author, title of source, title of publication, version, number, publisher, date, location

The MLA citation for Charles will be:

shelby, marian. “the fall of rome.” military forces. n. p., 11 mar 2009. web.

14 oct 2012.

Learn more about MLA citation, here:

https://brainly.com/question/12415105

#SPJ2

Noah recently installed a proprietary software application on his home computer. Under the terms of the license, he must renew his subscription to the application every year. What type of license does the application have?

The application has ____ type of license. It is different from a perpetual license since this type of license has____.

BLANK 1.
non-perpetual license
CC Attribution ShareAlike (CC BY-SA) license
GNU GPL

BLANK 2.
no expiration date
no support
no registration

Answers

Answer:

gnu gpl

no registration

Answer:

1.non perpetual license 2. no expiration date

Explanation:

After working without problems for a couple years, your computer has begun to lock up. You suspect that it is a thermal issue but you can't find any component that is not functioning correctly. You have not replaced the CPU or installed any new devices. The CPU cooling fan and the power supply fan are working properly. The lock-ups are happening with increasing frequency.
What is a common condition that might explain these symptoms?

Answers

Answer:

mabey it might be the hard drive or the booting disk that is going out so i would just replace the key parts the memory drive the hard drive the boot disk and the fans just to play it safe also check your screen if a wire or something is not working properly bcause the screen is also a key part of it i mean duh how could we use it without one:)

Explanation:

A common condition that might explain these symptoms is an accumulation of dust that has gradually built on the system in a sequence of processes.

What you can do in this scenario?

In this scenario, you would required to replace the suspect CPU with a known good CPU of the same make and model. Replacing the suspect CPU with a known good CPU of the same make and model is the best way to determine if the CPU is the problem.

According to the context of this question, you must be required to identify a problem first and then establish a theory of probable cause. Test the theory to determine the cause. Establish a plan of action to resolve the problem and implement the solution. Verify full system functionality and, if applicable, implement preventive measures.

Therefore, a common condition that might explain these symptoms is an accumulation of dust that has gradually built on the system in a sequence of processes.

To learn more about CPU, refer to the link:

https://brainly.com/question/474553

#SPJ6

Role of memory in a computer system

Answers

Answer/Explanation:

The role of memory in a computer system is to remember the date you have searched on it or websites you've visited or photos you've taken. This is called the memory drive. Memory drives are very important imagine spending your whole life on this video game and you finally finished your game! Well without the memory drive you'd have to start that game all over again.

Because of the memory drive we can save our data in our devices. Memory drive is used in every device that we use in modern day. Memory drives are important for computers to work properly. Did you know the reason we have fans or holes in the bottom of our computer is to cool the drives down in our computer?

It's because they get overheated cause they work on your computer constantly. Computers are very complex and high tech so it helps to make things into small drives. Memory is important for the survival of tech, computers. We use memory every day in different ways wether its our computers or our devices or our heads.

~ LadyBrain

When you start a new blank document, you begin typing at the

A. Center alignment
B. Right margin
C. Insertion point
D. Top alignment

Answers

C. The insertion poin

What is the name of database of viruses that an antivirus software scan for?

Answers

Answer:

Anti virus scanner. i hope :)

Explanation:

Adrcle has a diameter of 4 inches. Which statement about the area and circumference of the circle is true?
A comparison of the area and circumference of the circle is not possible because there is not enough information
to find both
The numerical values of the circumference and area are equal
The numerical value of the circumference is greater than the numeste value of the area
The numerical value of the circumference is less than the numerical value of the area

Answers

Answer:

The numerical values of the circumference and area are equal

Explanation:

Area of a circle = πr²

Circumference of a circle = 2πr

Radius, r = diameter/2

= 4 inches/2

= 2 inches

r = 2 inches

π = 3.14

Area of a circle = πr²

= 3.14 * 2²

= 3.14 * 4

= 12.56 inches ²

Circumference of a circle = 2πr

= 2 * 3.14 * 2 inches

= 12.56 inches

Area of a circle = 12.56 square inches

Circumference of a circle = 12.56 inches

The numerical values of the circumference and area are equal

Other Questions
which word, of translated into English from another language, would have the .last negative connotationA.funnyB.RidiculousC.HilariousD,Silly Express the inequality b < -1.4 using interval notation. Not sure what its called Find the area of the polygon helpppppppppppppppp meeeeee plzzzzzzzzzzzz Amino acids join together to create:A.nucleic acidsB. carbohydratesC. lipidsD. proteins Olivia is on a swing at the playground.If the swing is moving from W to Z, at which point is herkinetic energy increasing and her potential energydecreasing? (based on a starting point of W)OwOXzOY3OzY What is the product of 1.65 and 1.05 x 10^-2? what is photosynthesis Jezebel took a train to visit her uncle. The train traveled at a constant speed of 40 miles per hour. Complete the table. Then, write an equation to find the total distance d traveled after t hours. How does incarcerating people with mental health issues impact on our society? can u help mee this is my homework What is the density of the football 6. In a complex sentence like, "Although she's late to meetings, she always contributes good ideas," where is the emphasis?O A. On the independent clauseOB. On the adverbial clauseO c. On the predicateO D. On the dependent clause In the above figure, m&angle;P = 125 and m&angle;Q = 5x. If angles P and Q are supplementary angles.what is the value of x and the measure of angle Q?A. x = 61, m&angle; Q = 55B. x = 11, m&angle;Q = 16OC. x = 11, m&angle: Q = 55D. x = 43, m&angle;Q = 215 Simo scored 65 points in a game. Ella scored e points in the same game. If they scored a total of t points for the game, write an equation that expresses t in terms of e. You will not solve this equation, just write it. worth 44 points!! AP ENGLISHwrite a reflective essay explaining cultural identity aliyah is saving money to buy a new bicycle that cost $280. aliyah has already saved 80% of her goal. how much money has aliyah saved so far? 1/2-1/6x6/4 .................................... Select the correct answer from each drop-down menu.Read the excerpt, and then complete the sentence that follows.