1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
Computers and Technology
1 answer:
Aleksandr [31]3 years ago
5 0

Answer:

Data Masking

Explanation:

Data masking, also known as data obfuscation, is a process companies use to hide data. The main reason for applying masking to a data field is to protect data that is classified as personally identifiable information, sensitive personal data, or commercially sensitive data. Imagine a scenario where your organization is working with a contractor to build a database. Masking your data allows the contractor to test the database environment without having access to actual sensitive customer information.

You might be interested in
Do laws ever change to help enforce cyber hacking crimes
prisoha [69]
No I don’t think so personally
5 0
2 years ago
Read 2 more answers
Match the spacing options to their meanings.
Maslowich

Before text = indents paragraph to the right  

First line = indents the start of a paragraph

Register-true = formats page styles  

Line spacing = manages space between two lines  

The first line always gets indent to specify that it is a start of the paragraph

Line spacing always focus on the number of spaces between lines. There are various values available to give spacing according to the need. Register- true is used to format all the page styles and do other related configurations.

3 0
3 years ago
Read 2 more answers
What is the first thing you need to do to edit a graph?
Kay [80]
Know the numbers and info
3 0
2 years ago
Read 2 more answers
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
3 years ago
The first personal computer operating system was named ___________.
Ksenya-84 [330]
<span>The first personal computer operating system was named DOS.
DOS stands for disk operating system. A system software that manages hardware and software resources is an operating system and </span>the personal computer is used by one person at a time. The first personal computer was the ENIAC (<span>Electronic Numerical Integrator and Computer</span>) which became operational in 1946.
8 0
3 years ago
Other questions:
  • Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.
    5·2 answers
  • Which type of programmer designs programs for applications executed on the internet?
    10·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • What does social protocol means in network?
    9·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • Why do you think it is important to consider ethical considerations when reviewing technology and assessing the impact of partic
    9·1 answer
  • कम्प्यूटर में एक समस्या को ठीक करने के लिए एक कार्यक्रम या कोनफीगरेशन परिवर्तन के बाद किए जाते हैं
    5·1 answer
  • Which ribbon tab is not a default in Outlook 2016's main interface?
    13·2 answers
  • Key Vocabulary:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!