1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

What are two advantages of encrypting data stored in the computer system?

Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
8 0

Answer:

The two advantages of data encryption are as following:-

  1. Provides security to data.
  2. It protects privacy.

Explanation:

Encryption:-It is a method of safeguarding your data from outsiders or from the people you don't want to see it.

Encryption is basically protecting your data.So one of the main advantage of encryption is provides security to the data.

It maintains your privacy.If you don't want outsiders to see your data you can use encryption.

You might be interested in
The code selection above is taken from the Color Sleuth activity you just completed. This selection would count as an abstractio
Vinvika [58]

Answer:

b

Explanation:

4 0
3 years ago
Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
Step2247 [10]

Answer:

In the clarification portion below, the definition according to the received information is summarized.

Explanation:

  • <u>Characterization:</u>

It is indeed a summary of general object characteristics in something like a target class and creates characteristic laws.

  • <u>Discrimination:</u>

Just before predefined data types have been held to a different standard from everyone else, it's indeed bias which always happens.

  • <u>Association:</u>

It's a mechanism that determines the possibility that objects in a set will co-occur.

  • <u>Classification:</u>

It is indeed duction which attributes elements to target groups or classes in a set.

  • <u>Prediction:</u>

It is solely dependent on either the interpretation of other similar values to classify data points.

  • <u>Clustering:</u>

It has been used to position the components of the information through their corresponding classes.

  • <u>Evolution Analysis:</u>

It would be for objects whose behavior varies throughout time to explain or design regularities.

5 0
3 years ago
g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cac
Dimas [21]

Answer:

A. 2

Explanation:

The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.

7 0
3 years ago
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your onl
Marina CMI [18]

nobody cares about plagiarism dude

7 0
3 years ago
In which slot is a video card most commonly installed within a laptop?
IgorLugansk [536]

Answer:

<u>PCIe</u> is used for video card installation on Laptop.

Explanation:

Good quality applications, videos and games required graphics card for better results. These card can be installed on laptops, that required some ports.

PCI-e is a slot, that is used in laptop for video or graphic card interface. Video card or graphic card is used to enable high quality video or graphics on Laptop.

PCI- E stand for Peripheral Component Interconnect Express. It work as serial communication interface for high speed device.

7 0
3 years ago
Other questions:
  • The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to
    9·2 answers
  • List 7 internal components in a computer system
    8·2 answers
  • True or False: You cannot change the default margin size for Word documents.  
    6·1 answer
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • Write a program in Python that reads in investment amount, annual interest rate, and number of years, and displays the future in
    6·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!