Blank includes websites that encourage interaction and connection among people ,business and organizations

Answers

Answer 1
Answer: The answer would be social media

Related Questions

In stranger things 3 hopper said" to turn back the clock" which is a spoiler for season 4. (Something's gonna reset the clocks and all of what happens will begin again)
RAW files can be compressed without losing information t/f
Smart cards are also known as gift cards. a. True b. False
What will be the value of x after the following statement executes: x = 1 + 2 * 3 - 8 / 4 A. 3 B. 5.0 C. 2 D. 1.0
Pressing the ____ keyboard shortcut key(s) selects cell A1.END CTRL+HOME HOME CTRL+END

Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Answers

The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.

The correct matching for the first part of the question is:


1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans

The correct matching for the second part of the question is:


1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders

The correct matching for the third part of the question is:


1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key

Learn more about The CIA triad:

brainly.com/question/30479580

#SPJ11

One of the biggest risks involved in using e-mail isa. loss of privacy.
b. junk mail.
c. slowness.
d. lost attachments.

Answers

The answer is (b.) Junk Mail
Junk Mails are one of the biggest risks in e-mails. Junk emails refer to email which is unsolicited or something you don't ask to receive. Usually, junk email wants you to sell something. They are also known as spam emails.

Answer: A. Loss of Privacy

Explanation: 100% correct for PF exam. Hope this helps :-)

WILL GIVE BRAINLIEST Which online note-taking tool allows students to place an image on one side and a description on the other?

web clipping tools

electronic notebooks

electronic flash cards

online data storage sites

Answers

Answer:

electronic flashcards I think

Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function, that checks to see if the value of a is 0; if it is, the code prints the message "no solution for a=0" and returns from the method.

Answers

Answer:

Following are the code to this question:

if(a == 0)  //defining condition

{

System.out.print("no solution for a=0"); //print value

}

Explanation:

In question, it is declared, that a method defined with three double parameters, that are "a, b, and c", inside this method a code is defined, that checks the given value.

  • In the method, a conditional statement defined, in the if block, it checks the value of a is equal to 0.
  • If this condition is true, it will use the print method, inside the method, a message is printed, that is "no solution for a=0".

Iman has 48 months to save $18,000, the maximum amount he estimates his first year of college will cost. He does not want to depend on interest, and does not consider interest when determining his minimum monthly savings goal. What is the minimum amount he should save per month to achieve his goal?

Answers

ANSWER: $375

EXPLANATION: Iman wants to save $18,000 in 48 months without depending on interests. He wants to save the entire amount on his own. So, we will need to divide the amount he wants to save by the number of months he has got to save. So, $18,000 รท 48 = $375.

The minimum amount that Iman should save is $375 

Powerpoint displays many that are varied and appealing and give you an excellent start at designing a presentation

Answers

PowerPoint displays many themes that are varied and appealing and give you an excellent start at designing a presentation.