1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
13

Password procedures, information encryption software, and firewalls are examples of measures taken to address:

Computers and Technology
1 answer:
Gnoma [55]3 years ago
5 0
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
You might be interested in
You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
Effectus [21]

Answer:

The formula is =D3*E3

Explanation:

To multiply the items in 2 cells, the formula like every other in excel begins with = .

to multiply 50 in cell D3 by 8.90 in cell E3 the formula to be used is

=D3*E3

This will multiply the numbers in both cell and show as 445.

7 0
4 years ago
A cubic inch is equivalent to which of the following values?
nydimaria [60]

Answer:

C. 16.387

Explanation:

8 0
3 years ago
What is the seven major components of IT infrastructure?​
Mkey [24]

Answer:

Explanation:

These are the seven major components of IT infrastructure

1. Operating system platforms

2. Networking & telecommunication

3. Computer Hardwares

4. Data storage and management

5. Internet network

6. Consulting and system integeration service

7. Enterprise softwares

These components are necessary in order to run a success business in the IT field.

3 0
3 years ago
Read 2 more answers
"Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussion
Alenkasestr [34]

Answer:

Collaboration information system

Explanation:

Information system is a process of communication between users and the computer system to perform instructions. The system is divided into three main parts, they are, computer side, data and user side. The computer side is the hardware and software of the computer system that receives data for execution. User side is the people and the procedure used to input data.

Collaboration system is a type of information system that a group of people use to share ideas electronically, regardless of their location, for efficiency and effectiveness in the work done or project.

4 0
3 years ago
A quad-core processor can handle 1 program on each of its 4 cores at the same time. If there are 20 programs queued to run on it
Viefleur [7K]

Answer:

4845 different combinations of programs

Explanation:

A combination is an arrangement where order is NOT important.

In this case, the number of different combinations of assignments of the programs is,

_^{20}C_{4} = \frac{20!}{4!(20-4)!}

_^{20}C_{4} = \frac{20.19.18.17.16!}{4.3.2.1(16)!}

_^{20}C_{4} = \frac{20.19.18.17}{4.3.2.1}

_^{20}C_{4} = \frac{116280}{24}=4845

Hope this helps!

8 0
3 years ago
Other questions:
  • Get user input as a boolean and store it in the variable tallEnough. Also, get user input as a boolean and store it in the varia
    8·1 answer
  • PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte
    8·1 answer
  • Organizational structures with one or more layers of authority between top-level management and employees are known as vertical
    9·2 answers
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
    13·1 answer
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • A motorist is using the AHP to choose a new car from three possible models Arrow, a Bestmobile and a Commuter. The choice will a
    15·2 answers
  • Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
    5·1 answer
  • What year did the first hovercraft sail on water
    15·1 answer
  • Ashley has many interests. She likes to read, listen to music, and play soccer with her friends. But her favorite thing to do is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!