Answer:
to close an open application
The number system is what is use globally as are way of counting the total number of digits is 9 because you can make any number with characters 1-9
Cryptography is not a reason to use when posting photos on a public social media website.
Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.
- Cryptography literally means "hidden writing", which is what the method is all about.
- It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
- This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
- Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
- One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.
Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.
Learn more about cryptography here:
brainly.com/question/88001
Answer:
Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.
Answer:
intrusion detection system
Explanation:
intrusion detection system
IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.