1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

What are two advantages of encrypting data stored in the computer system?

Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
8 0

Answer:

The two advantages of data encryption are as following:-

  1. Provides security to data.
  2. It protects privacy.

Explanation:

Encryption:-It is a method of safeguarding your data from outsiders or from the people you don't want to see it.

Encryption is basically protecting your data.So one of the main advantage of encryption is provides security to the data.

It maintains your privacy.If you don't want outsiders to see your data you can use encryption.

You might be interested in
Please help guys I'm so lost ​
PilotLPTM [1.2K]

Answer:

The correct answer is C ( W * 5 )

4 0
3 years ago
Read 2 more answers
Project 1-1: Set Up a Small Network
Wewaii [24]

Answer:

a. peer-to-peer

b star topology

Explanation:

3 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
What is a massive, room-sized computer that process and store enormous amounts of bulk data and information?
kipiarov [429]

Answer:

Mainframe Computer

Explanation:

The Mainframe Computers are designed for bulk data processing with high speed and storing huge data that can't be performed by other regular PCs. They can run multiple instances of operating systems at the same time. They are used for application such as accounting, business transaction, information retrieval, airlines for the seat reservation and engineering computation.

7 0
2 years ago
A contracting company recently completed its period of performance on a government contract and would like to destroy all inform
avanturin [10]

Answer:

A. Consult data disposition policies in the contract.

Explanation:

The disposition of data should be carefully handled. The data associated with government project should be handled with care as it may include sensitive information. To destroy the data the company should refer the agreement and see if there is any notes included regarding the data disposition policy. The course of action to destroy the data should be according to the agreement.

5 0
3 years ago
Other questions:
  • Gateway drugs are normally not addictive
    15·2 answers
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • Which best describes IMEI?
    5·1 answer
  • The reason for prioritizing your work is to get the
    6·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    14·1 answer
  • Choose all the answers that apply.
    15·1 answer
  • To accomplish a certain task when you would rsther be doing something else is an example of
    9·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • Brainliest to right answer.
    10·1 answer
  • Gabby is creating a game in which users must create shapes before the clock runs out. Which Python module should Gabby use to cr
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!