1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
9

____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia

lity D. Integrity
Computers and Technology
1 answer:
Anni [7]3 years ago
8 0

Answer:

C. Confidentiality

Explanation:

With confidentiality, a person who intercepts messages you intend to remain private cannot read them and thus increases your document protection

You might be interested in
what is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulate
Soloha48 [4]

A honeypot is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion.

What is software?
Software is a grouping of computer programmes, along with auxiliary data and files. In contrast, hardware is the foundation upon which a system is built as well as what actually does the work. Executable code is the lowest level of programming and is made up of machine language instructions that are supported by a single processor, usually a central processing unit (CPU) or even a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent processor instructions that alter the previous state of the computer. One effect that is not immediately visible to the user is when an instruction modifies the value kept in a specific storage location in the computer.

To learn more about software
brainly.com/question/28224061
#SPJ4

4 0
1 year ago
Does anyone know a way to skip the videos on Edgnuity?
Mazyrski [523]

Answer:

Yes, there is usually a skip button in the corner.

Explanation:

when i have to watch videos on there thats how i skip it

Hope this helps!!

7 0
3 years ago
To use mail merge future, use tab on the ribbon
EastWind [94]

Answer:

Mailing tab

Explanation:

THIS IS THE COMPLETE QUESTION BELOW

To use mail merge features , use .................... tab on the Ribbon.

Tabs are been sectioned into groups,The groups under mailing tabs are utilized in performing steps needed for mail merge process. Mailing tab comes as fifth tab in the ribbon. This tabs enables the user to merge emails, preview results as well as writing and inserting different fields.

7 0
3 years ago
Because __________ software can block suspicious software in real-time, it has an advantage over such established anti-virus det
shutvik [7]

Because dynamic analysis software can block suspicious software in real-time, it has an advantage over such established anti-virus detection techniques as fingerprinting or heuristics.

<h3>What is dynamic program analysis?</h3>
  • The examination of computer software by means of the execution of programs on a physical or virtual processor is known as dynamic program analysis.
  • Effective dynamic program analysis requires running the target program with enough test inputs to account for almost all potential outputs.
  • Utilizing software testing tools like code coverage increases the likelihood that a sufficient sampling of the program's potential behaviors has been seen.
  • Additionally, it is important to take precautions to reduce the impact that instrumentation has on the target program's execution, especially its temporal characteristics.
  • Static program analysis contrasts with dynamic analysis. Dynamic testing is used in unit tests, integration tests, system tests, and acceptance tests.

To learn more about the topic, refer to the following link:

brainly.com/question/17209742

#SPJ4

8 0
2 years ago
What is a coverage map used for
erastova [34]

Answer/Explanation:

A coverage map shows how much land something takes up or reaches to.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a new function called "listmax" based on the following IPO # function: listmax # INPUT: a list # PROCESSING: obtains the l
    9·1 answer
  • Using the flowchart diagram, identifythe decision point of this solution?
    6·1 answer
  • Which are examples of embedded systems? Choose two answers.
    15·1 answer
  • T-shaped, square-bottomed, dovetailed, and V-shaped are all types of _______ in a machined part. A. gears B. bolts C. lines D. s
    8·2 answers
  • Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
    9·1 answer
  • Discuss the role that Cloud Computing plays in an organization and the potential impact that Cloud Computing has on IT.
    8·1 answer
  • Which two statements are true about the Data Sync functionality? (Choose two.)
    15·1 answer
  • Complete the firstMiddleLast() function to return a new string with the first, middle, and last character from string. If string
    9·1 answer
  • The number of binary digits required to count 10010 is called _________​
    10·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!