1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
4 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
Computers and Technology
1 answer:
Aleksandr [31]4 years ago
5 0

Answer:

Data Masking

Explanation:

Data masking, also known as data obfuscation, is a process companies use to hide data. The main reason for applying masking to a data field is to protect data that is classified as personally identifiable information, sensitive personal data, or commercially sensitive data. Imagine a scenario where your organization is working with a contractor to build a database. Masking your data allows the contractor to test the database environment without having access to actual sensitive customer information.

You might be interested in
Which of the following trims would be used at the beginning of a scene?
Ad libitum [116K]

Answer: a i think

Explanation:

6 0
3 years ago
Kali linux os and window os who is the best​
kogti [31]

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

4 0
3 years ago
Read 2 more answers
given the numerical value 1010101.11, which of the following number systems is most likely represented.
nasty-shy [4]

Answer:

u have to give me more points

Explanation:

sorry

7 0
3 years ago
In what cattell called the ____ form of factor-analysis, large amounts of data are collected on one subject over a long period.
True [87]
The P technique. 


Good luck! (:
3 0
4 years ago
Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
Westkost [7]
My best guess would be either B. or C. 
Hope I helped:)
8 0
3 years ago
Read 2 more answers
Other questions:
  • ____ variables are variables that are shared by every instantiation of a class. local instance
    8·1 answer
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • A) A cable that is mainly used in the cable television network
    11·1 answer
  • How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
    10·1 answer
  • The system requirements for software include the
    5·1 answer
  • 16. A
    15·1 answer
  • Malware is any malicious software installed on a computer or network without the owner’s knowledge.
    10·1 answer
  • If you have limited means, you...?
    9·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
  • The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts wher
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!