1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
7

_____ can render data useless to unauthorized users who might have violated some of the database security layers.

Computers and Technology
1 answer:
podryga [215]3 years ago
8 0

Answer:

Data Encryption

Explanation:

Data encryption is a measure of security in which information is encoded and such information can only be encrypted and accessed by an authorized person with the correct key for encryption. They are used in the deterrence of malicious, unauthorized, or negligent users from having access to data that are considered sensitive.

You might be interested in
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
Ok i dont wanna get bannddddddd so i have to ask a qustion<br> 2 plus 2
Evgesh-ka [11]

Answer:

22 or 4

Explanation:

:)

3 0
2 years ago
Read 2 more answers
Why is a personal laptop computer NOT a server?
bixtya [17]
I believe the answer is C) <span>servers are used directly by computers, not by people

Have a good day! =)</span>
4 0
3 years ago
Read 2 more answers
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
TRUE OR FALSE!!!!!
KatRina [158]

Answer:

True

Explanation:

Using CCleaner, it's revealed that there are trackers within "secure" websites/apps such as Google and Tiktok. The manufacturer(s) of these websites/apps can share your information with whoever they're working with. Since people often look past the terms and conditions when installing an app and or program, they don't see that companies can easily retrieve all of your data within a couple clicks.

6 0
3 years ago
Other questions:
  • Lisa wants to send an email with some confidential Information. Which of these options would work best for her?
    6·1 answer
  • What category of sensory receptors are sensitive to touch sound and motion?
    10·1 answer
  • .____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
    10·1 answer
  • When you open as many links as you want, and still stay in the same browser window instead of cluttering your screen with multip
    5·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    15·1 answer
  • Choose the type of error described.
    12·1 answer
  • Explica el empleo de cuentas y contraseñas en archivos
    6·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
  • What are the basic data types supported in C programing language?
    10·1 answer
  • What is a system of access control that allows only limited use of material that has been legally purchased?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!