1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
4 years ago
13

Password procedures, information encryption software, and firewalls are examples of measures taken to address:

Computers and Technology
1 answer:
Gnoma [55]4 years ago
5 0
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
You might be interested in
BlueGriffon has four different views, called: Question 4 options: Normal, All Tags Mode, Source, and Preview.� WYSIWYG, HTML, So
daser333 [38]

Answer:

WYSIWYG, HTML, Source, and Preview in Browser

Explanation:

First, open the html file you are editing from the File : Open dialog, or from the Open File icon on the toolbar. Click on the toggle Browser Preview on the toolbar or from the View menu. This will give you a quick browser preview. Click on the button again and it will return to the code view

8 0
3 years ago
The software that controls the computer hardware and establishes standards for developing and executing applications best descri
victus00 [196]
An operating system such as windows or macos
4 0
4 years ago
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
crimeas [40]

Answer:

Specialization

Hope this helps!

6 0
4 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
    10·1 answer
  • How is it possible to find encyclopedias and reference texts on the internet
    11·2 answers
  • In a nested repetition structure, one loop, referred to as the ____ loop, is placed entirely within another loop, called the ___
    5·1 answer
  • Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control
    11·1 answer
  • What activities are coordinated by the OS?
    11·1 answer
  • Read the scenario and then answer the question using only the information provided.
    14·2 answers
  • Select the correct answer.
    12·2 answers
  • Select the correct answer. Which of these is a game-centric handheld gaming console? A. IPad B. iPhone C. PSVita D. Xbox ​
    9·2 answers
  • Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
    7·1 answer
  • Three positive impacts of computer technology in our society.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!