1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
9

To prevent unauthorized users from reading data as it travels over a network, what process should the administrator specify?

Computers and Technology
1 answer:
Simora [160]3 years ago
4 0
I think the answer is encryption
You might be interested in
While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
Otrada [13]

Answer:

Evaluate source credibility

Explanation:

cuz it is

4 0
3 years ago
Which one of the following statements referring to mobile Internet
zhenek [66]

Answer: All are true

Explanation:

6 0
4 years ago
Read 2 more answers
The ____ feature automatically locates specific text and then replaces it with desired text. Find and Replace Locator Locate and
jekas [21]
The "Find and Replace" feature automatically locates specific text and then replaces it with desired text.
8 0
4 years ago
To open the format cells dialog box with the alignment sheet active, tap or click the alignment settings ____.
Otrada [13]
<span>To open the format cells dialog box with the alignment sheet active, tap or click the alignment setting button
</span>
3 0
4 years ago
What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
beks73 [17]

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

5 0
3 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
    13·2 answers
  • Below is a sequence of 32-bit memory address references observed during the execution of an application, and given as word addre
    7·1 answer
  • Who defined the term crowdsourcing in a Wired magazine article?
    15·1 answer
  • Which of these should most likely be included in a wire frame ?
    12·1 answer
  • Which of the following statements about the placement of illustrations in documents is true?
    12·1 answer
  • On the Cities worksheet, click cell H13 and enter the function that calculates the total costs for the first city. Copy the func
    14·1 answer
  • How do you access the Control Panel?
    7·1 answer
  • What are the disadvantages of using photo editing software in photography?
    14·1 answer
  • Como se llama este icono de word
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!