answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: 1. List and Describe the critical characteristics of information. How are they used in the study of computer security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does Steinbeck describe the migrant workers What terms does he use What characteristics do theY have?

Steinbeck describes the migrant workers in "The Grapes of Wrath" as resilient, resourceful, and hardworking individuals who are marginalized and economically oppressed. He refers to them as "Okies" and portrays them as nomadic and downtrodden due to the Dust Bowl and the Great Depression. These workers exhibit a strong sense of community, endurance, and hope in the face of adversity.


Points out that the accauracy of a computer's output depends on the accuracy of the input?

One saying that has been around computer people for many decades is 'Garbage In = Garbage Out'. The quality of the information put into the computer has always been critical to the quality of the information you can get out of any computer


What is a critical information list?

A critical information list is a document that outlines key information needed during an emergency or crisis situation. It typically includes contact details for key personnel, critical suppliers, and important stakeholders, along with essential information like emergency procedures, access codes, and critical system information. Having a well-maintained critical information list can help organizations respond effectively to unexpected events.


What is a critical information list CIL?

A Critical Information List (CIL) is a document that contains essential information needed for emergency response and recovery operations. It typically includes contact details for key personnel, critical infrastructure locations, emergency procedures, and other vital information to ensure effective crisis management. Having a CIL can help organizations respond promptly and efficiently during emergencies.


How did the computer age form?

The computer, or information, age formed by capitalizing on the computer micro-miniaturization advances. This spans from the advent of the personal computer in the 1970s, to the internet reaching it's point of critical mass in the 90s.


Three critical things that genes were known to do?

There are three critical things that the genes are meant to perform. They are carrying the gene to the next generation, replication of genetic information and find the organisms' heritable characteristics.


What are the impact of computers on critical thinking?

impact of computer on critical thinking the impact of computer on crticial thinking? the impact of computer on crticial thinking?


What are the Characteristics of creative thinker and critical thinker?

A creative thinker is innovative, open-minded, and willing to take risks in generating new ideas. On the other hand, a critical thinker is analytical, objective, and evaluates information carefully to make informed decisions. Both types of thinking are valuable for problem-solving and decision-making in different contexts.


What are the quality characteristics that are critical to the health record?

AccuracyAccessibilityComprehensivenessConsistencyCurrentlyDefinitionGranularityPrecisionRelevancyTimeliness


What are two classifications of critical information?

The two classifications of critical information are unclassified and classified.


What are the two classifications of critical information?

The two classifications of critical information are unclassified and classified.


What is the area critical for processing visual information?

The occipital lobe is the critical area for processing visual information.