1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
14

Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way

as to render them unusable by unauthorized third parties?
a. Default allow
b. Separation of duties
c. File encryption
d. Fail-secure
Computers and Technology
1 answer:
Alla [95]3 years ago
8 0

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

You might be interested in
What is the other alternative keyboard to the qwerty?
AnnZ [28]
Dvorak is an example.
There are also variations of Qwery like Qzerty, Qwertz, Azerty
6 0
3 years ago
Read 2 more answers
ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently
Aleksandr [31]

Answer: what density should it be on a retina screen to maintain its apparent size?

7 0
3 years ago
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Mamont248 [21]

Answer:

a,b,c,e

Explanation:

7 0
3 years ago
Read 2 more answers
In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
Solnce55 [7]
Up to 24 bits can be used to identify unique <span>networks.</span>
5 0
3 years ago
Define the four basic operation of a computer ​
Alexeev081 [22]

Answer:

input, output, processing, and storage.

Explanation:

input - the transfer of information into the system. ( ex: what you type on a keyboard. )

output -  the presentation of information to the user ( example is the screen. What type of display is presented...?)

processing - obtaining  information based on what you you searched ( What search results you get after putting in the input)

Storage - Storing or saving information into files.

6 0
3 years ago
Other questions:
  • Are sql injections legal?
    15·1 answer
  • True/False
    11·1 answer
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • hi i'm bored so.... free point and if you have any Netflix shows that are good do tell also i'm going to pick one person to give
    7·2 answers
  • A technician selected the GUI interface on a wireless router and added a DNS address of 208.67.220.220. The technician then imme
    6·1 answer
  • Given the integer variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another integer va
    7·1 answer
  • What can you use on Code.org's Web Lab to find and fix problems when you are writing code for your website?
    13·1 answer
  • At currents as low as
    5·1 answer
  • Can’t be opened because apple cannot check it for malicious software.
    15·1 answer
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!