Which of the following attack is a threat to confidentiality?
a. snooping
b. mas...
Computers and Technology, 24.01.2020 20:31, milkshakegrande101
Which of the following attack is a threat to confidentiality?
a. snooping
b. masquerading
c. repudiation
Answers: 1
Computers and Technology, 22.06.2019 17:00, smartoa
Annie is creating a corporate report for a company’s annual meeting. in the report, she wants to add the signature of various department heads. which device can annie use to capture signatures to include in the report? a. printer b. monitor c. e-reader d. digitizing tablet
Answers: 1
Computers and Technology, 22.06.2019 19:00, alyssashae1818
Which parts of a presentation should be the most general? a. introduction and conclusion b. introduction and outline c. outline and conclusion d. outline and body
Answers: 1
Computers and Technology, 23.06.2019 01:30, bri2728
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most? a)give the file a unique name b)name the file in yymmdd format c)use descriptive name while naming the files d)use capital letters while naming the file
Answers: 3
Mathematics, 03.02.2021 22:00
Mathematics, 03.02.2021 22:00
Mathematics, 03.02.2021 22:00
Mathematics, 03.02.2021 22:00
Mathematics, 03.02.2021 22:00
Mathematics, 03.02.2021 22:00