1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
8

Written and artistic expressions are protected by

Computers and Technology
1 answer:
MAXImum [283]3 years ago
3 0
I believe the word you are looking for is "Copyright".
You might be interested in
The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
V125BC [204]
Yes it’s true the window net use command is a quick way to discover any shared resources on a computer or server
8 0
2 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
3 years ago
What do u do to me pepa
Maru [420]
Peppa: Hello Susie!

Susie: *mehhh* Hello Peppa!
What are you doing?
Peppa: I'm learning to whistle,

but I can't do it yet.
Susie: Hmm.. that sounds hard.
Peppa: It's impossible!
Uh.. can you whistle Susie?
Susie: No

Peppa: *honk* Oh good! I mean-
that's sad if you can't whistle

but good because I can't whistle

Susie: What's whistling anyway?
Peppa: You put your lips together
and blow!
Susie: Like this? *whistles*
8 0
2 years ago
Which two security regulations does the PCI enforce with regard to electronic banking?
Sever21 [200]

The two security regulations the PCI enforce in regards to electronic banking are an external Qualified Security Assessor (QSA) or by a firm specific Internal Security Assessor that creates a Report on Compliance for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.

5 0
3 years ago
Read 2 more answers
Frequently used data is identified and read from the hard disk into memory, or _____, and is easily accessible when needed.
frutty [35]

Answer:

The answer would be disk cache.

7 0
3 years ago
Other questions:
  • Which css property configures the capitalization of text?
    12·1 answer
  • Fix the 2 error codes.
    14·1 answer
  • Which is the highest level of the hierarchy of needs model?
    7·2 answers
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • Can you list one property of each of the following?<br> Excel<br> Word<br> Powerpoint
    7·2 answers
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • Suppose that the host with IP address 10.0.1.19 sends an IP datagram destined to host 128.119.160.183. The source port is 3324,
    7·1 answer
  • Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging t
    15·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • A gui allows you to interact with objects on the screen such as icons and buttons true or false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!