1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
4 years ago
13

Password procedures, information encryption software, and firewalls are examples of measures taken to address:

Computers and Technology
1 answer:
Gnoma [55]4 years ago
5 0
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
You might be interested in
Is hacking always wrong? Creating viruses?
nalin [4]

Answer:

yes

Explanation:

6 0
2 years ago
Read 2 more answers
Does someone know what type of usb is that one called?
Doss [256]
It is USB 2.0 mini b 5 pin

3 0
3 years ago
Read 2 more answers
Accessing a web site in search of magazine articles about a product before its purchase is an example of what part of the consum
GaryK [48]

Accessing a web site in search of magazine articles about a product before its purchase is an example of<u> information seeking.</u>

<u />

<h3>Why knowledge seeking is important?</h3>

Information seeking as a social phenomenon has been instrumental in identifying how academics disseminate new ideas and comment on existing research. Observing how academics make informed choices, and identify resources and strategies to stay on top of the publications is an important element of academic research.

<h3>What are information-seeking Behaviours?</h3>

Information-seeking behavior is the act of actively seeking information to answer a specific query. Information-searching behavior is the conduct which stems from the searcher interacting with the system in question.

To learn more about Information seeking, refer

brainly.com/question/1382377

#SPJ4

3 0
2 years ago
Sending obscene material over the internet cannot be successfully prosecuted because of what
babunello [35]
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
5 0
3 years ago
Karen has found and removed all Web postings about her ex-boyfriend Bill. She has moved on. She’s now researching information ab
Naya [18.7K]

<u>Researching information about a project for work:</u>

The internet has a lot of information to offer when it comes to making a project about almost anything. There are a lot of web sites, posts,  articles, research papers, and even presentations about the topics that are most likely to be chosen for projects.

The best way to evaluate web sites about the content they offer is to know whether the site has an authorized or trusted source or  not.

There are platforms over the internet where people end up giving false information in the name of freedom of speech. The information conveyed should be genuine and supported by facts and figures.

6 0
4 years ago
Other questions:
  • While creating your résumé, what should you do before making a final copy to fix any typos or errors?
    6·1 answer
  • What is the device that allows users to manipulate data by controlling an onscreen pointer
    5·2 answers
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • Brian's father drives a car that uses voice commands for navigation. Which Al application field is Brian's father using?
    11·1 answer
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • Select the correct answer.
    13·1 answer
  • A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email,
    9·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • When people receive benefits just because they belong to a particular identity group, this is called
    14·1 answer
  • Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behav
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!