Which of the following attack is a threat to confidentiality?
a. snooping
b. mas...
Computers and Technology, 24.01.2020 20:31 milkshakegrande101
Which of the following attack is a threat to confidentiality?
a. snooping
b. masquerading
c. repudiation
Answers: 1
Computers and Technology, 22.06.2019 03:00
You install teamviewer on your workstation at home so that you can ac ess it when on the road. how can you be assured that unknown users cant access your computer through team viewer?
Answers: 2
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
Computers and Technology, 23.06.2019 12:00
Using the list, you can select the number of photos that will appear on each slide. a. theme b. frame shape c. pictures in album d. picture layout
Answers: 1
Computers and Technology, 24.06.2019 01:30
Hazel has just finished adding pictures to her holiday newsletter. she decides to crop an image. what is cropping an image?
Answers: 1
Mathematics, 18.03.2021 02:40
Health, 18.03.2021 02:40
Mathematics, 18.03.2021 02:40
English, 18.03.2021 02:40
Mathematics, 18.03.2021 02:40
Social Studies, 18.03.2021 02:40
Mathematics, 18.03.2021 02:40
Biology, 18.03.2021 02:40
Biology, 18.03.2021 02:40
Mathematics, 18.03.2021 02:40