1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
13

Password procedures, information encryption software, and firewalls are examples of measures taken to address:

Computers and Technology
1 answer:
Gnoma [55]3 years ago
5 0
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
You might be interested in
Which type of virus includes protective code that prevents outside examination of critical elements?
Vlad1618 [11]

Answer:

Armoured viruses

Explanation:

Armoured viruses are computer viruses that have been found to be very dangerous, Armoured viruses ar designed to protect itself against any attempt to detect or trace Its activities. They have different ways through which they bypass antivirus software applications in a computer system, making it very difficult to eliminate from an infected system.

5 0
3 years ago
A software process describes the interrelationship among the phases by expressing their order and frequency, but does not define
Angelina_Jolie [31]

Answer: False

Explanation:

 Yes, the given statement is false as, a software process basically describe the phases by express their frequency and order. But it is also define the products that are deliverable in the projects.

The phases in the software process basically describe the various steps and task which is necessary to make plans and schedules. Project deliverable also include project scheduling for determining the each phases.

5 0
3 years ago
You are creating a presentation and you have come to the last slide. you still have more information to add. what should you do?
ohaa [14]
If you are using Google Slides, Click the plus arrow in the top left hand corner of the webpage. That will add another slide to the presentation you are working on
7 0
3 years ago
Read 2 more answers
In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
const2013 [10]
D. Prototyping. This is because a prototype is basically a replica of the original one and in order to find out what all we need to add in our original, material selection plays a vital role in prototypes.
4 0
3 years ago
Controlled intersections use some form of which of the following:
Genrish500 [490]
A.all of the above it is correct 
7 0
3 years ago
Other questions:
  • 8 POINTS!!!!!!!!
    6·2 answers
  • With microprocessors, The integration of a whole _____ onto a single chip or on a few chips greatly reduced the cost of processi
    14·1 answer
  • ANSWER THIS CORRECTLY FOR BRAINLIEST
    13·2 answers
  • Identify the type of error described
    6·1 answer
  • Copy and paste is the only way to move text from one place to another.<br><br>True or <br>False​
    15·2 answers
  • Can you help me with this question please ​
    13·1 answer
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
  • Dynamics simulate stillness via calculations performed by the computer.
    13·2 answers
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!