1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
2 years ago
10

When a cryptogrpahic system is used to protect data confientiality what takes place?

Computers and Technology
1 answer:
Alex73 [517]2 years ago
5 0

Answer:

Unauthorized users are prevented from viewing or accessing the resource

You might be interested in
Which statement best describes multimedia
d1i1m1o1n [39]

Answer:

I couldn't find options to this question online but I will give you an explanation so you can choose the correct answer.

Explanation:

The term multimedia refers to something that uses multiple media simultaneously when transmitting information.

Examples of this can be:

  • photographs
  • sounds
  • text
  • video

Multimedia frames the objects and systems that use multiple physical or digital media to transmit content. It also refers to the media that store and disseminate these types of content.

6 0
4 years ago
Martha is developing a software program in C++ and has a question about how to implement a particular feature. She performs an o
VLD [36.1K]

Answer:

A blog

Explanation:

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is organised by posts.

7 0
3 years ago
What is the function of a computer screen?
Leni [432]

Hi!

A computer screen is what you are staring at right now!

It displays the output. Behind it are wires and cords.



~CoCo

7 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
How can you relate the careers in Finance as BSIS students?
Vinvika [58]

Explanation:

Banker.

Accountant.

Financial advisor.

Financial analyst.

Investment manager.

Insurance agent.

Financial analyst.

Financial associate.

Financial planner.

Investment analyst.

Budget analyst.

hope it helps

8 0
3 years ago
Other questions:
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • Read the PIC Data sheet Chapter 2.0 and 3.0 2. List at least 3 big differences between the Flash and RAM 3. How many RAM locatio
    5·1 answer
  • Agile methods typically use a ______ model, which represents a series of iterations, or revisions, which are based on user feedb
    7·1 answer
  • The system requirements for software include the
    5·1 answer
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 235, output is 30. Note: Our sys
    7·1 answer
  • Which of the following best describes the purpose of a design specification?
    11·1 answer
  • What is a computer? ​
    13·2 answers
  • Can someone please help? i am trying to code my raspberry pi pico in python, and it says this is wrong. Can someone help tell me
    6·1 answer
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!