1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

What are two advantages of encrypting data stored in the computer system?

Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
8 0

Answer:

The two advantages of data encryption are as following:-

  1. Provides security to data.
  2. It protects privacy.

Explanation:

Encryption:-It is a method of safeguarding your data from outsiders or from the people you don't want to see it.

Encryption is basically protecting your data.So one of the main advantage of encryption is provides security to the data.

It maintains your privacy.If you don't want outsiders to see your data you can use encryption.

You might be interested in
with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
GenaCL600 [577]

With option A: IDP the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segregates that traffic from other packets on the internet.

<h3>What in security is IdP?</h3>

A system that produces, maintains, and manages digital IDs is known as an identity provider (IdP). The IdP has two options for user authentication: directly through the user, or indirectly through third-party service providers (apps, websites, or other digital services). IdPs provide user authentication as a service, to put it simply.

Note that A system component known as an identity provider (IdP) gives an end user or internet-connected device a single set of login credentials that guarantee the entity is who or what it claims to be across several platforms, apps, and networks.

Learn more about An identity provider from

brainly.com/question/29024344
#SPJ1

6 0
1 year ago
7. When using find command in word we can search?
lesya [120]

Answer:

When using find command in word we can search all of the above

6 0
3 years ago
Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
NemiM [27]
The answer is column F. During relative copy and paste in Excel, the positioning of the '$' symbol effectively indicated an absolute reference to a position, so that is not updated. Therefore, in the formula '<span>=F$5+12</span>', only column F is updated. 
8 0
3 years ago
When you save a presentation with a .potx file extension, which type of powerpoint file is created?
Elena L [17]
A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.
6 0
2 years ago
Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time
Lynna [10]

He should use a Thesaurus.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    7·1 answer
  • Which of the following should you always wear to avoid being thrown from a vehicle and then crushed if it tips over?
    12·2 answers
  • A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have d
    11·1 answer
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • If you do not want to keep a change made by the autocorrect feature, you can click the ____ button on the auto correction option
    12·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
  • Hardware is found outside the system unit.​
    13·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!