1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
4 years ago
9

____ software is rights-protection software used to control the use of a work.

Computers and Technology
1 answer:
jeka57 [31]4 years ago
3 0
<span>Cyclos is a project of STRO, a leading organisation on monetary innovations. Cyclos offers a complete on-line payment system with additional modules such as e-commerce and communication tools. [ [ The Cyclos platform permits institutions such as local banks and MFI`s to offer banking services that can stimulate local trade and development. Cyclos is also used by many organizations and</span>
You might be interested in
Which statements describe letterheads?
Slav-nsk [51]
C is the corrected answer i think??????
4 0
3 years ago
Read 2 more answers
___ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking
serious [3.7K]
It is known as the firewall software. A firewall is a program or gadget that goes about as a boundary to keep ruinous components out of a system or particular PC. Firewalls are arranged with particular criteria to square or forestall unapproved access to a system.
4 0
3 years ago
________________ involves tricking other people into breaking security procedures and sharing sensitive information.
Nuetrik [128]

Answer:

The right answer is social engineering.

Explanation:

social engineering has different meanings in terms of computer security and social studies.

In computer security, social engineering can be defined as the practice to manipulate some people so that they give their personal credentials with the attacker. Their first moto is to gather the information of that user by fraud.

It can be the credential of banking, system access etc.

Hence, the most appropriate answer is social engineering.

5 0
3 years ago
Read 2 more answers
Write a menu-driven program for a user to store information about the media collection they own. This requires using an array of
Phoenix [80]

Answer:

Check Explanation and attachment.

Explanation:

Since the site does not allow me to submit my work(for you to easily copy and paste it), I will post some additional attachments.  

Please, note that there is category, unique ID, description for each media item.

#include <stdio.h>

#include <string.h>

struct Media {

int id;

int year;

char title[250];

char description[250];

char category[50];

};

void show_menu();

void add_item(struct Media arr[], int *c);

void print_all(struct Media arr[], int c);

void print_category(struct Media arr[], int c);

void delete_entry(struct Media arr[], int *c);

int main() {

struct Media collection[100];

int ch, count = 0;

// loop until user wants to quit

while (1) {

show_menu(); // display the menu

printf("Enter your choice: ");

scanf("%d", &ch);

if (ch == 1)

add_item(collection, &count);

else if (ch == 2)

print_all(collection, count);

else if (ch == 3)

print_category(collection, count);

else if (ch == 4)

delete_entry(collection, &count);

else if (ch == 0)

break;

else

printf("Invalid choice. Try again!\n");

}

return 0;

}

void show_menu() {

printf("1. Add a media item to the collection\n");

printf("2. Print all media in the collection\n");

printf("3. Print all media in a given category\n");

printf("4. Delete an entry\n");

printf("0. Quit\n");

}

void add_item(struct Media arr[], int *cnt) {

7 0
3 years ago
Uhmm... So like I am trying to login on this account to my phone and I forgot my password... how do I recover it... I am literal
Degger [83]
Try using your email to sign in then press “forgot password” then re set it through email!!
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consi
    15·1 answer
  • What component of a processor handles all logical comparisons and calculations inside the processor?
    9·1 answer
  • Which type of server and network topology is preferable in a bank?
    9·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • Menciona dos ventajas que ofrece el procesador de textos word
    11·1 answer
  • A set of programs that enable the hardware to process data is
    13·1 answer
  • PLEASEEE HELPPP im gonna cry
    11·2 answers
  • 1. Imagine that you sit down to your computer (after finishing all your homework) to play your favorite video game. However, whe
    9·1 answer
  • True or false we can used virus not use pirated software and programs ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!