1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
Computers and Technology
1 answer:
Aleksandr [31]3 years ago
5 0

Answer:

Data Masking

Explanation:

Data masking, also known as data obfuscation, is a process companies use to hide data. The main reason for applying masking to a data field is to protect data that is classified as personally identifiable information, sensitive personal data, or commercially sensitive data. Imagine a scenario where your organization is working with a contractor to build a database. Masking your data allows the contractor to test the database environment without having access to actual sensitive customer information.

You might be interested in
What does NOT match with Agile Manifesto?
Butoxors [25]

Answer:

yes

Explanation:

7 0
3 years ago
When the binary code is retrieved from ram and moved to the cpu, this stage is known as
vaieri [72.5K]

This stage is known as fetching.

  • Any operation you do in a computer, it runs a lot of codes inside it, and these codes are in binary.
  • For the operation, the computer accesses the RAM memory to gather information about this process, and moves it to the CPU, in a process named as fetching.
  • Thus, the stage asked in this problem is known as fetching.

A similar problem is given at brainly.com/question/21536104

4 0
2 years ago
Plz..... Add the following Binary numbers 1. 111000 + 1100 + 111111​
Korvikt [17]

Answer:

11000011

Explanation:

This is because of the rules of bas 2

3 0
2 years ago
For questions 3-6, consider the following two-dimensional array:
elena-s [515]

Answer:

5= Fabric

6=bandana

Explanation:

8 0
3 years ago
Read 2 more answers
1. _____ are used to clarify code, but are not interpreted by the interpreter as commands. (1 point)
mariarad [96]

Answer:

1. D Comments

2. B False

3. C Logical Expression

8 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • What is the primary criticism against a national identification system based on biometric data?
    13·1 answer
  • What is a common source of connection problems with ethernets?
    9·2 answers
  • Which information is considered free for use?
    9·2 answers
  • teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
    14·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • Emerson needs to tell his browser how to display a web page. Which tool will he use?
    8·2 answers
  • What is the term used for a set of programs that acts as an interface between the applications that are running on a computer an
    13·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Please hurry!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!