1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
9

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious sof

tware has altered that data.
Computers and Technology
1 answer:
Ivan3 years ago
5 0

Answer:

Integrity

Explanation:

<em>Integrity</em>: It is the basic information protection technique which ensures that the information is correct and that no unauthorized person or malicious software has altered that information.

You might be interested in
The 'client area' of a window is the area used to display the contents of the window (thus a title bar or border would lie outsi
Lady_Fox [76]

Answer:

<u>Window.java</u>

  1. public class Window {
  2.    int width;
  3.    int height;
  4.    public Window(int width, int height){
  5.        this.width = width;
  6.        this.height = height;
  7.    }
  8.    public int getWidth(){
  9.        return width;
  10.    }
  11.    public int getHeight(){
  12.        return height;
  13.    }
  14.    public int getClientAreaHeight(){
  15.        return getHeight();
  16.    }
  17. }

<u>Main.java</u>

  1. public class Main {
  2.    public static void main (String [] args) {
  3.        Window win1 = new Window(12, 15);
  4.        System.out.println(win1.getClientAreaHeight());
  5.    }
  6. }

Explanation:

<u>Window.java</u>

There is a Window class with two int type attributes, width and height (Line 1 - 3).

The constructor of this class will take two inputs, width and height and set these input to its attributes (Line 5 - 8). There are two methods getWidth and getHeight which will return the value of attributes width and height, respectively (Line 10 - 16).

The required new method getClientAreaHeight is defined in line 18 -20. This method will call the getHeight method to return the height value of the window (Line 19).

<u>Main.java</u>

We test the Window class by creating one Window instance and call the getClientAreaHeight method and print the return output (Line 1 -6).

We shall see 15 is printed.

4 0
3 years ago
Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tes
KengaRu [80]

Answer:

Explanation:

A tester has to evaluate, test and find errors, in this job you have to provide all the analysis and improve the software.

A tester has to evaluate:

  • Interact with buttons
  • Enter data
  • design for multiple situations

A tester must have these abilities:

  • The ability to work calmly under pressure.
  • Organizational capacity .
  • Logical thinking.
  • Ability to plan future work.
  • Pay attention to the details.

7 0
3 years ago
Where does a word processor store items that you cut or copy?
V125BC [204]
<span>it is stored on your clipboard and you can get to it by pressing ctrl+c</span>
3 0
3 years ago
Points on how will successfully submit quizzes in ICT correctly?
jeka94

Answer:

I am sorry but I don't understand your question. Can you edit it and explain it more briefly?

Explanation:

6 0
4 years ago
Several ways that we commonly use technology today that people couldn’t 10 years ago.
icang [17]

Explanation:

1. We cast our phones to our televisions so we can see our phone screen on the t.v. This is helpful to society as it exterminiates the need for extra, unnecessary wires connecting to the t.v.

2. We use technology to secure our homes. Many people have even exchanged a door key for a pad lock. This is helpful in the essence that we no longer need to worry about losing our keys, but it is harmful in that pad locks can be easily broken into as opposed to a house key which takes more time. For instance, there is an app where it shows you heat signatures in different colors depending on time. You can easily access a pad locked door by using this app.

3. We pay expenses through our phones (such as eChecks or Applepay) which is helpful in that it makes life easier and quicker, but harmful in that it allows easy access for hackers as well as identity theft. After all, it's not difficult for a hacker or even just an enemy of yours to decrypt a simple password or pin on your phone, especially when people leave their phones exposed in their back jean pockets and are constantly losing their phones in general.

6 0
3 years ago
Other questions:
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • Implement a java program to find the smallest distance between two neighbouring numbers in an array.
    7·1 answer
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • A reflexive pronoun is a pronoun
    6·1 answer
  • Picking up sound over a great distance while making it seem to come from close up.
    11·1 answer
  • A digital footprint is .
    7·1 answer
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
  • Write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it belongs to a seperator/cont
    14·1 answer
  • Which of the following best explains how the Internet is a fault-tolerant system?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!