Answer:Obscurity
Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.
The functioning of the security through obscurity(STO) works by hiding the flaws and errors related to security of the operating system.Thus , Signe is willing to use obscurity system.
Microscope
bc thats the answer
Answer:
d
Explanation:
All of the above can be means by which signals or information is transferred.
<span>One way to align and organize your table of contents is by using margins, which are dotted lines that precede your typed information. The margins </span>indicate how much white space places there are between the worksheet data / the table of contents and the edge of the page.You can adjust the margins as you wish (narrow or wide).
Answer:
The correct answer to the following question will be "Encapsulation".
Explanation:
- Encapsulation relates to the pooling of data with techniques used by the database or the limitation of immediate access to many of the elements of the entity.
- As data is being processed for transfer to the network, it's split into tiny pieces and a trailer and header are attached to each piece to help determine it.
- It is a method of shielding data facts and preserving the object's data and actions from abuse by certain objects.
Therefore, Encapsulation is the right answer.