1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
7

To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia

ble economical secure
Computers and Technology
1 answer:
nasty-shy [4]3 years ago
7 0

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
You might be interested in
Return true if the given non-negative number is a multiple of 3 or 5, but not both. Use the % "mod" operator.
Pani-rosa [81]

the following C++ function will return true if the given non - negative number is multiple of 5 or 3 else it will return false.

bool function( int x ){

// variable to check if it is multiple of both or not

int number =0;

if(3%x == 0){

number++;

}

if(5%x == 0){

number++;

}

// Now returning by deciding

if( number <=1)

return true;

else

return false

}

4 0
4 years ago
Why is it important to use fillings,coating/icing,glazes or decorations for pastry products​
Marizza181 [45]

Answer:

Frosting improves the cake's appearance.

Explanation:

Special occasion cakes become more festive with frosting and decorations; and, Frosting improves the keeping the qualities of the cake by forming a protective coating around it, sealing in moisture and flavor and allowing it to be eaten over a couple of days.

7 0
3 years ago
Definition of blog? computer science
inysia [295]

Blogs are sites online owned by a person and or a group of people, usually containing things like videos, pictures and overall things that happened in their day. Blogs are updated daily and have explanations or an overall report on what their day was like.

7 0
4 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
32.043 in expanded form
Andre45 [30]

What does expanding a number really mean? When we expand a number, we are showing the value of each digit in that number. For example, the number 521 has a total of 500 + 20 + 1. This number has been written in its expanded form by showing the value of each digit.

In the case of a decimal number above 32.043, we will write each number according to its place value. This will be done by multiplying each digit by its place value and then adding them together. In this case, 32.043 in its expanded form will be;

(3×10) + (2×1) + (0× 1/1000) + (4×1/100) + (3×1/10)

(30)+ (2) + (0.0) + (0.04) + (0.003)


7 0
3 years ago
Read 2 more answers
Other questions:
  • Most licensing agencies offer an orientation meeting for applicants who want to obtain licensing for a child care facility or a
    12·2 answers
  • What allows user to double click with the mouse in a document to move the insertion point to a new location.?
    8·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • What is the purpose of filters in a database?
    11·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • Your laptop donot have a serial port. what type of connector will your laptop requireyour laptop donot have a serial port what t
    7·1 answer
  • Why am I not getting the activation link for my account?
    11·1 answer
  • Please program this in Python.
    13·1 answer
  • Which are examples of ribbon customizations?
    11·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!