________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Question 41 options: A) Availability B) Confidentiality C) Authenticity D) Nonrepudiation

Answers

Answer 1
C) Authenticity

Authenticity refers to the ability to identify the person or entity whom you are dealing on the internet.

Related Questions

How does Google work, why does it work that way?

Answers

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

Which attitudes are most common among successful IT professionals?

Answers

Answer:

understanding the problem very well

writing documention to every piece of code you write

write clear and concise code

follow Industry accepted format for data storage

avoid recursion if possible

write modular code

What technique do API developers most commonly use to limit access to an API to authorised individuals and applications?

Answers

Answer:

API keys

Explanation:

API (Application Programming Interface) is a computing interface that defines the interaction between multiple software intermediaries.

API key is a specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication, and usually have a set of access rights to the API associated with it.

These are commonly used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?

a. Emperor penguins
b. Penguin colony
c. Emperor penguin large group
d. Emperor penguin family

Answers

Answer:

d. Emperor penguin family or b. Penguin colony

which of the following is something that an information systems (IS) professional would do? A. devise new ways to use computers B. turn information into meaningful decisions C. help people with their technology needs D. create and maintain computer network

Answers

Answer:B

Explanation:

it professionals build and repair computers, create and aunts in networks, and help people with their technology needs.

An example of something that an information systems (IS) professional would do is: B. turn information into meaningful decisions.

An information system (IS) can be defined as a set of components or computer systems, that is typically used to collect, store, and process data, as well as for the dissemination of information, knowledge, and the distribution of digital products.

Basically, an information system (IS) interacts with its environment by receiving data in raw forms while information are received in a usable format.

Generally, all organizations make use of an information system (IS) in the following areas:

Supply chain management.To process financial accounts.Manage their workforce.Marketing channels to reach their customers or potential customers.Transform information into meaningful decisions.

In conclusion, the transformation of an information into meaningful decisions that are in tandem with organizational goals and objectives is something that an information systems (IS) professional would do.

Read more here: https://brainly.com/question/25162387

The Google brand name appears on thousands of websites due to its ________ API. Select one: a. proprietary b. open source c. closed source d. user-controlled

Answers

Answer: open source

Explanation:

Typically, most applications that we run on our computer usually consist of a user interface. An application programming interface is also just an interface, which is not meant for users but rather applications.

The Google brand name appears on thousands of websites due to its open source API.

What is "social
comparison"?
A. When you compare your social life to others' social
life
B. When you compare your life to others' social media
posts and feel like your life is worse
C. When you compare your online posts to others'
online posts and feel like yours are worse
D. When you compare your life to others' online posts
and feel like your life is better

Answers

Answer:

A. When you compare your social life to others.

Answer:

A. When you compare your social life to others' sociallife...........

which is the correct APA format in books?​

Answers

Answer:

It includes the author's last name, the year, and  a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case

The APA in-text citation for a book includes the author's last name, the year, and (if relevant) a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case (only capitalize the first word and any proper nouns).

Miguel, your system administrator, warns you of a new virus threat. This particular virus changes forms to avoid detection by antivirus software. What type of virus is it?

Answers

Answer:

I think it is Polymorphic virus.

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was when the employee last performed a backup. Which type of network is the company more than likely using?

Answers

WWW/ World Wide Web.

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Answers

Answer:

overclocking.

You should check your cooling when doing this, otherwise you can burn your processor.

Why is taking care of your camera important?

Answers

taking care of your camera is important for keeping the camera functioning properly and lasting a long time.

In the development stages where an application is not yet sufficiently mature enough to be able to be placed into a test environment, which of the following techniques are applicable?

a. Static Binary Code Analysis and Manual Binary Review
b. Static Source Code Analysis and Manual Code Review
c. Dynamic Binary Code Analysis and Static Binary Review
d. Dynamic Source Code Analysis and Automatic Code Review

Answers

Answer:

A and C

Explanation:

Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnoticed so they can continue to steal data c. conduct cyberwarfare d. reveal weaknesses in business and government websites and then force them offline

Answers

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

What is one way you might code-switch when posting a comment to a class discussion?

Answers

Answer:

The term code switching has been expanded and can encapsulate in any situation that speaker find to be switch from vocabulary.

Explanation:

It is a truly remarkable skill when you communicate your emotions, thoughts and opinion to others. It does not mean that we just to communicate our language but our language influence our thought, emotions and language and self identity.

we communicate our culture that is reflected in our language. Our language tells that who we are and from where we comes.

Code switching is related to the speakers alternates use of multiple language. in the one communication.

For example: Grace for beautiful gift ( Esta awesome).

Surrendering to digital distractions will likely result in learning more material. O False True​

Answers

Answer:True

Explanation:

{Netiquette Question Worth 50 points}

[Which would be a responsible use of technology used by victims of cyber bullying]

•Finding ways to strike back at bullies online

•Buying software that allows them to track down bullies

•Changing passwords and screen names regularly

•pretending to be someone else to hide their identity

Answers

Answer:

Changing passwords and screen names regularly

Explanation:

I did it on edgenuity

_is a computer network created for an individual person

Answers

Answer:

Personal area network

Explanation:

is correct 100% sure

A computer professional who designs ways to organize, store, and retrieve data is a database .

Answers

Answer:

Database Designer

Explanation:

Database design means organization of data as per the database model. The database designer what data should be stored and how the various data elements interrelate.

A database designer designs database design that includes indexes, tables, constraints, views, procedures, triggers and other constructs needed to store, retrieve and delete persistent objects.

One can become a database designer by following the below mentioned steps:

Earn a Bachelor's Degree in a Related Field Or Gain Foundational Training.

First earn a Bachelor's degree

Gain real world database development experience.

Acquire IT Database certifications and develop Soft Skills

Which statement best describes what you would be aware of when you copy or move files from one place to another place?

Answers

Answer: The files are copied from the main folder or destination folder and pasted on another location or folder.

Explanation:

The files can be moved automatically from one folder to another. The files are then can be copied from one folder and pasted on another. The new file destination allows the automatic file renaming. The file can be erased or removed from the previous location. Copying a file is a means of content duplication.

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

Answers

Answer:

Ram or random access memory

Explanation:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery

Answers

Complete Question:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Group of answer choices

A. servers

B. PaaS

C. IaaS

D. SaaS

Answer:

D. SaaS

Explanation:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease software as a service (SaaS) are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

ATM machines respond to request in__________​

Answers

Answer:

Atm machine respond to request in atm card

ATM machines respond to requests in ATM card.

What is an ATM Machine?

ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.

ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.

Hence, the ATM card gives commands to the ATM machine.

Read more on atm machine:

https://brainly.com/question/24471380

#SPJ2

Explain why computer users should use the cloud?

Answers

Developing in the cloud enables users to get their applications to market quickly. Hardware failures do not result in data loss because of networked backups. Cloud computing uses remote resources, saving organizations the cost of servers and other equipment.

To create a list to store integers, use:________

a. ArrayList list = new ArrayList();
b. ArrayList list = new ArrayList();
c. ArrayList list = new ArrayList();
d. ArrayList list = new ArrayList();

Answers

Answer:

ArrayList<Integer> list = new ArrayList<>();

Explanation:

From the list of given options a to d

ArrayList represents the list name

Also, the syntax is similar to java programming language. Hence, I'll answer this question base on the syntax of Java programming language.

In java, the syntax to declare a list is

[Variable-name]<list-type> list = [Variable-name]<list-type>();

Replace [Varable-name] with ArrayList

ArrayList<list-type> list = ArrayList<list-type>();

From the question, the list is meant to store integers;

So, replace list-type with integer...

This gives

ArrayList<Integer> list = new ArrayList<>();

What should you do if you copy a sentence from a book into a document
you are writing for your employer?
A. Ask your boss to read the document.
B. Give credit to the author for the work you used in your document.
C. Check the spelling of your document.
ОА
OB
Ос
HINT
SUBMIT
PREVIOUS
5 of 18
here to search
A
The

Answers

Answer:

Your answer is going to be B

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n) __________ attack.

Answers

Answer:

"Advanced persistent threat " is the right one.

Explanation:

APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period. They represent compound channel assaults that use different components including various approaches of attack.

Don't click on this I am testing

Answers

Don't click on this I am testing... I want the points so.

Answer:

ok

Explanation:

utility software is also known as _____​

Answers

Answer:

Utility programs

Other Questions
f(x) = 5x + 12. Find f1(x) (17-7)6+2+56-8Pemdas The size of humans steadily increased because they ate more. Why did they eat more?A. They were able to kill larger animals.B. They were hungrier.C. Food that was cooked tasted better.D. Cooked food was easier to digest.* A,B and c * C and D *B and D *A,C and D A laser with a power of 1.0 mW has a beam radius of 1.0 mm. What is the peak value of the electric field in that beam tell if this is fiction or realistic fiction A little girl named Mary,lived in a village with her longed hairbrother. She thought i was weird ,she had short hair ,her brother had long hair. What remark does the poet make about rain in the poem "Life"by Charlotte Bronte Which of the following statements accurately describe the importance of the American concept of government and democracy? American democracy is based in part on the ideas of de Montesquieu. (multiple select) American democracy cannot evolve or change. American democracy is based in part on the ideas of John Locke.v American democracy is a model for other nations.v Read the definitionsIf you look through the curtains, you canwatch the birds over the ocean.Which homophones correctly complete the sentence?shear = v. to cutsheer = adj., thinsoar = v. to fly at a great heightsore = adj feeling painsheer soarshear, soreshear soarsheer sore Major product of free radical of chlorination of propene Here are the positions at three different times for a bee in flight (a bee's top speed is about 7 m/s). Time 6.6 s 6.9 s 7.2 s Position 1.8, 5.0, 0 m 0.5, 6.9, 0 m 0.4, 9.5, 0 m (a) Between 6.6 s and 6.9 s, what was the bee's average velocity? Be careful with signs. vavg, a = 7.6739 (b) Between 6.6 s and 7.2 s, what was the bee's average velocity? Be careful with signs. vavg, b = 4.58557 (c) Of the two average velocities you calculated, which is the best estimate of the bee's instantaneous velocity at time 6.6 s? (d) Using the best information available, what was the displacement of the bee during the time interval from 6.6 s to 6.65 s? r = m You have at your disposal 3 1-pound bags of various pure salts that dissolve readily in water. You can add one of the bags to a 55 gallon barrel of water. Which bag should you use to lower the freezing point by the greatest amount? (1 lb. = 0.454 kg) g A ball is thrown against the wall and bounces back with the same velocity. What type of collision is this What is the solution for this inequality?-10x < 40 Howard Gardner proposed a model that described ____ different types of intelligences. How did cultural diffusion affect early civilizations ? Which type of climate is described as having hot temperatures and heavy rainfall all year round A. Arid. B. Dry tropical. C. Mediterranean D. Wet tropical find sin60 A.1/2 B.2/2 C.3/2 How many types of ions must be present in solution, at minimum, for the phenomenon of selective precipitation to be observed? Your answer should be a whole number without any decimal places. -(x+2)+6. anyone know how to solve it? Which fact was most likely discovered between the time of Mendeleevs table and the time of Moseleys table that helped Moseley develop his version?