1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
8

What is the process of comparing data with a set of rules or values to find out if the data is correct?

Computers and Technology
2 answers:
mart [117]3 years ago
8 0
Code for this perpose exist
NARA [144]3 years ago
3 0

Answer:

Data validation

Explanation:

Data validation is a process of checking and ensuring how valid a data is by comparing it with a set of rules or values.  In other words, data validation checks for the validity of data. A data is valid if it is meaningful and correct.

For example, in validating a phone number, one might want to make sure it does not contain any letter. A phone number cannot contain but pure numbers and a few signs such as + and -.

In validating the last name of a person, one might want to ensure that it does not contain special characters such as @, #, & and so on. It has to contain nothing but letters.

You might be interested in
What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
vaieri [72.5K]

The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

<h3>What is replay attacks in security?</h3>

A replay attack is known to be a kind of security attack that is known to be done if  or when a cybercriminal is said to spy on a secure network communication.

Note that by this, they tend to intercepts the message  and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that  the hacker wants.

Hence, The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

learn more about  digital data from

brainly.com/question/28346439

#SPJ1

8 0
1 year ago
Which of the following transfer rates is the FASTEST?
Usimov [2.4K]

Answer:

The correct answer is 1,480 Mbps.

Explanation:

For this you have to know how to convert bytes to different units.

1,000 Bytes (b)  = 1 Kilobyte (Kb)

1,000 Kilobyte (Kb) = 1 Megabyte (Mb)

1,000 Megabytes (Mb) = 1 Gigabyte (Gb)

and Finally, 1,000 Gigabytes (Gb) = 1 Terrabyte (Tb)

4 0
2 years ago
What Is the Purpose of a Web Browser? *<br><br>​
Aneli [31]
A web browser takes you anywhere on the internet. It retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images and video are transmitted on the web.
6 0
2 years ago
Read 2 more answers
After a normal system shutdown, when the computer is turned off, contents of the memory used to store bios settings are
kiruha [24]
The settings are retained

<span>Technically, Bios software is stored in a non-volatile ROM (Read-Only Memory) chip found on the motherboard.  Usually, this kind of chip retains its contents even after a normal system shutdown. Rom chips contains programs that are collectively referred to as BIOS chip or Basic Input/Output Services</span>
8 0
3 years ago
Read 2 more answers
Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
Alexus [3.1K]
In the C programming language, you can't determine the array size from the parameter, so you have to pass it in as an extra parameter. The solution could be:

#include <stdio.h>

void swaparrayends(int arr[], int nrElements)
{
int temp = arr[0];
arr[0] = arr[nrElements - 1];
arr[nrElements - 1] = temp;
}


void main()
{
int i;
int myArray[] = { 1,2,3,4,5 };
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
swaparrayends(myArray, nrElements);

for (i = 0; i < nrElements; i++)
{
printf("%d ", myArray[i]);
}

getchar();
}

In higher languages like C# it becomes much simpler:

        static void Main(string[] args)
        {
            int[] myArray = {1, 2, 3, 4, 5};
            swaparrayends(myArray);
            foreach (var el in myArray)
            {
                Console.Write(el + " ");
            }

            Console.ReadLine();
        }

        static void swaparrayends(int[] arr)
        {
            int temp = arr[0];
            arr[0] = arr.Last();
            arr[arr.Length - 1] = temp;
        }

3 0
3 years ago
Other questions:
  • What filter gives a “squeezed” effect to an image?
    14·2 answers
  • PLEASE HELP ASAP!!!
    15·2 answers
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • The 7-bit ASCII code for the character ‘&amp;’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • Web design and development tools
    13·1 answer
  • After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password
    10·1 answer
  • What is the minimum number of bits you would need to represent a number on a 0 to 10 scale
    15·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!