1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
10

Using a unique username and a complicated password is one possible method to verify that a user is who they say they are. What t

ype of goal is this?
Computers and Technology
1 answer:
Mumz [18]3 years ago
8 0

Answer:

Data Authenticity

Explanation:

Data authenticity is the quality of a data being genuine and not corrupted from the original.

In data security, this is used to ascertain (proof) an identity.

Exchange of information is always important in our day to day activities and every source of information needs to be known beyond reasonable doubts.

So, the goal of having a unique username without passwords is just not enough because usernames are always visible (or not difficult to trace) on every accounts; hence, the need for a password.

Data Authenticity is to have assurance that an action, a message, a transaction, an activity, or other exchange of information is from the source it claims to be.

You might be interested in
i see tabs named mowed and Ramsey i tried shredding them and deleting them and ending all the processes but they start duplicati
VikaD [51]

1.Select the data.

2.Go to Data –> Data Tools –> Remove Duplicates.

3.In the Remove Duplicates dialog box: If your data has headers, make sure the 'My data has headers' option is checked. Make sure the column is selected (in this case there is only one column).

4 0
3 years ago
Write a statement that terminates the current loop when the value of the int variables x. and y.are equal
lakkis [162]
To <span>rite a statement that terminates the current loop when the value of the int variables x. and y.are equal please check below:
</span>
if (x == y) break; // exit loop 

I hope the answer will help you. Thank you. 

6 0
3 years ago
In pre-shared key mode, a passphrase should be at least ________ characters long.
alexandr402 [8]
10.......................................

8 0
3 years ago
TODAYS ATTENDANCE QUESTION: Why do you think it is important to be able to measure using a ruler in Technology &amp; Engineering
Vaselesa [24]

Answer:

Because it takes precision to a lot of things in tech and Eng. We need to measure all kinds of things, like wood, metal/etc. for computers and things that we use everyday, Because our world goes around being precise about things that we need everyday, like tables and things.

Explanation:

3 0
3 years ago
Many works by Mark Twain were published before 1923. In addition, there are other works that were discovered after his death and
Sauron [17]
I think is the last one
4 0
4 years ago
Other questions:
  • Mention 3 wast water draining system on home​
    7·1 answer
  • 1.where should the name of the website or company logo appear on a website
    5·2 answers
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • List at least three benefits of automated testing?
    13·1 answer
  • When using a search engine, what is the name of a word or phrase somebody types to find something online?
    12·2 answers
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
    12·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • PLEASE HELP! (NO LINKS)
    7·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!