subject
Computers and Technology, 25.02.2022 14:00 leo4687

1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability) and justify your a. Someone has copied your credit card and CVV number.
b. If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.”
c. If the attacker has deleted the installed copy of the Microsoft Office application from your laptop.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 11:40, malibu777
Design a pos circuit that displays the letters a through j on a seven-segment indicator. the circuit has four inputs w, x, y, and z which represent the last 4 bits of the uppercase ascii code for the letter to be displayed. thus, if wxyz = 0001 then "a" will be displayed. (any answer with 22 or fewer gates and inverters, not counting any for the inputs, is acceptable)
Answers: 2
image
Computers and Technology, 22.06.2019 19:10, kaiya789
10. when you create a pivottable, you need to specify where to find the data for the pivottable. is it true
Answers: 2
image
Computers and Technology, 24.06.2019 17:00, yobanajk
Aman travel 200m towards east< br /> from his house then takes left< br /> to turn and moves 200 m north< br /> find the displacement & distance.< br />
Answers: 3
image
Computers and Technology, 25.06.2019 04:30, precioussmith76
What should be used when performing vehicle maneuvers?
Answers: 1
You know the right answer?
1. Choose in each case that it affects which of the Information security requirements (confidentiali...

Questions in other subjects:

Konu
Mathematics, 26.09.2019 08:50