Which are online text sources? Check all that apply.

Answers

Answer 1
Answer: Online text sources are just information you find on the internet. Whereas it is online news, magazines, wikis and any other type of information on the internet.
Answer 2
Answer:

Answer:

A,C,D

Explanation:

  • ---as a way to learn from others

as a way to play games

  • ---as a way to find information
  • ---as a way to socialize with others

as a way to copy the work of others


Related Questions

What type of stone was the most common building material of royal pyramid?
How many generations of computer languages have there been since the middle of the 20th century
Computers in a peer to peer network belong to a
Consider the following code segment. System.out.print(*); // Line 1 System.out.print("*"); // Line 2 System.out.println(); // Line 3 System.out.println("*"); // Line 4 The code segment is intended to produce the following output, but may not work as intended. ** * Which line of code, if any, causes an error?
How will you define a text?

Whats in a computer?

Answers

A lot of things are in a computer there a motherboard, A cpu, A hard drive etc. A motherboard is the computer system  bascilly its the heart for a computer. The cpu is the the brain of a computer it controls on your computer and keeps it going good. finally a hard rive is the memory of your computer it stores all the data including files, photos, etc
CPU/processor,Motherboard, and Power supply unit.

Match the CIA triad to the methods and techniques used to ensure them: preparing for fast disaster recovery with backups and business continuity plans Biometric Verification 1. Confidentiality promptly applying system upgrades and patches 2. Integrity Two-Factor Identification 3. Availability One way encryption checksums (hashes) File permissions Match the terms with associated concepts. used to determine identities and permissions 1. Authentication and Authorization detection of intruders by monitoring network traffic/intruders 2. Prevention and Resistance 3. Detection and Response stop intruders from accessing and reading data Match the terms with associated concepts. Encryption that uses a pair of keys, one called a public key and the other a private key. Using the same key to encrypt and decrypt a message. 1. Asymetric key encrption 2. Symetric key encryption Allows people to exchange secret messages without ever having met to exchange a key 3. One-way encryption < A hash function that generates a digital fingerprint of a message is an example of this

Answers

The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.

The correct matching for the first part of the question is:


1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans

The correct matching for the second part of the question is:


1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders

The correct matching for the third part of the question is:


1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key

Learn more about The CIA triad:

brainly.com/question/30479580

#SPJ11

A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system is known as __________.

Answers

Answer:

SECURITY ANALYSTS

Explanation:

Security Analysts is a specialised security

administrator which is responsible for maintaining the security and integrity of data and performing system development life cycle activities in the development of a security system. The security analyst must have knowledge of every aspect of information security within the organisation and must analyze the security measures of the company and determine how effective they are.

The specialized security Administrator will be responsible for keeping data safe across the organization by monitoring, reporting, and addressing them and he must takes measures to protect a company's sensitive information.

Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?

Answers

TCP/IP is the standard set of protocols. Note that these are actually 2 protocols working together.

TCP (Transmission Control Protocol) is responsible for ensuring the reliable transmission of data across Internet-connected networks, while IP (Internet Protocol) defines how to address and route each data packet to make sure it reaches the right destination.

Let me know if you have any questions.

To customize the mini toolbar, color schemes and enable the Live Preview feature you would use the _______________ option

Answers

Space bar option to do that

Trackwrestling mobile link

Answers

Assistive technology can promote healthy emotional and social development by catering the needs of young children and teens in a faster and easier way when used correctly. When they reach into adulthood, it will be easier for them to access things because they are used to it.