1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
7

_____ can render data useless to unauthorized users who might have violated some of the database security layers.

Computers and Technology
1 answer:
podryga [215]3 years ago
8 0

Answer:

Data Encryption

Explanation:

Data encryption is a measure of security in which information is encoded and such information can only be encrypted and accessed by an authorized person with the correct key for encryption. They are used in the deterrence of malicious, unauthorized, or negligent users from having access to data that are considered sensitive.

You might be interested in
Tony is in charge of all presentations for a Fortune 500 pharmaceutical company. In addition to creating powerful and persuasive
Ludmilka [50]

Tony uses the Document Inspector dialog box to <u>remove confidential company information</u> from the presentation.

Explanation:

Document Inspector dialogue box has come as boon to the presentation and office document makers. This saves them from any discrepancies’ regarding revealing any sensitive information, unwanted information, hidden data’s etc.

These information’s if released can be a matter of concern for the employee as well as an organisation. Document inspector prevents an employee from later embarrassment and any legal troubles arising out of his actions.

Hence, Tony who is in charge of Fortune 500 pharma company decided to use Document Inspector dialogue box to make sure that his presentation his complete in all aspects of professionalism and is bereft of any sensitive and unwarranted information.  

5 0
3 years ago
Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
sasho [114]

Answer:

The correct answer to this question is option (1).

Explanation:

Let x1 = Is number of pages that printer A can print  in page/minute.  

thus x1 + 5 = Is number of page that printer B can print in page/minute.  

As printer A finishes his work in 60 min. So the task has 60x1 pages. As printers A and B both finish that task in 24 minutes. So the equation can be given as:  

60x1 = 24x1 + 24(x1 + 5)  

 

60x1 = 24x1 + 24x1 + 120  

 

60x1=48x1 + 120

 

60x1-48x1=120

 

12x1=120  

 

x1=120/12

 

x1=10

put the value of x1 in to (60x1). Therefore, the task has 60(10) = 600 pages. the task contains 600 pages.  

So the answer to this question is option (1).

7 0
3 years ago
Concentric circles on a disk platter where data is stored;________
bagirrra123 [75]

Answer:

Tracks

Resilient File System (ReFS)

Explanation:

  1. Concentric circles on a disk platter where data is stored is called Tracks
  2. The new file system developed for Windows Server 2012 is called Resilient File System (ReFS). It allows increased stability for disk storage and improved features for data recovery and error checking
4 0
3 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
jeka94

Answer:

it would be amhv i think i hope it answered u'er question

Explanation:

8 0
3 years ago
6
Mama L [17]

Answer:

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

Explanation:

P.S - The exact question is -

To find - Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.

FIRST BLANK

=IF(D3>50; E3; F3)

=IF(D3>50);( E3; F3)

=IF(10<5;23);("Incorrect")

SECOND BLANK

=IF(A1>60;"Pass";"Fail")

=IF(A1>60); ("Pass"; "Fail")

=IF(A1>60; ("Pass"; "Fail"))

Solution -

An IF structure is built following this pattern:

IF(TEST;IF TRUE;IF FALSE)

So,

The correct option is -

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

7 0
3 years ago
Other questions:
  • Consider the following method.
    13·1 answer
  • #TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.
    14·1 answer
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Which cell formatting is most likely to use $?
    5·1 answer
  • This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used
    9·1 answer
  • Swapping two input integers if they are not the same. (use switch-case
    10·1 answer
  • In his digital portfolio, Ben wants to locate each work he created. Where can he list details about the work in his digital port
    7·2 answers
  • PLEASE HURRY 30 POINTS
    15·2 answers
  • Which of the examples is part client side code
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!