1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
4 years ago
13

1. ___________ ensures the integrity and security of data that are passing over a network.

Computers and Technology
1 answer:
allochka39001 [22]4 years ago
5 0

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

You might be interested in
Why would you use a database system instead of traditional file system
iris [78.8K]

Answer:

Traditional database system is the system that contains all the data in the computer files on a computer system. The organization of the data is done in the form of files sets. In this system, large amount of data is not properly accessible due to inefficiency and also consumes lot of time.

Instead of the traditional system,database system is used, which has the collection of the data that gets stored in the database management system(DBMS).They can be managed by the operating system.

They have qualities like consuming large amount of data, any type of information, independent to work ,less time-taking development of application for etc. which is not present in traditional system.Thus database system are chosen over the traditional system.

4 0
3 years ago
Which of the following demonstrates the proper way to specify a variable-length argument list?
larisa86 [58]

Answer:

The answer to this question is option "d".

Explanation:

In the given question option d is correct because variable-length argument is a new feature in J2SE 5.0 which stands for java 2 standard edition and 5.0 is the version name. It is the variable-length argument lists. A coder can create functions that uses a function to receive several parameter that is not specified. An argument type followed by an ellipsis(...) in the parameter list of a method means that a fixed number of arguments of that particular type is obtained by the method. and other options are not correct that can be given as:

  • In option a, we do not need to use the string the variable-length argument list. That's why it is wrong.
  • The option b and c are all wrong because in the last parameter the variable-length argument list is used.

That's why the answer to this question is the option "d".

7 0
3 years ago
Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis
Helga [31]

Answer:

Explanation:

The language I use would do it as

h1$ = copy(h$,1,3)

This may not satisfy you, because your language could be quite different. You might want an input statement of some kind that would define h$. This assumes that somewhere h,h1 are declared as  strings.

You also have to know how to read an input. My language uses readln(input,h)

and how to write it on the screen write(h1) or writeln(h1)

6 0
3 years ago
Which program assesses and measures improper medicare fee-for-service payments (based on reviewing selected claims and associate
jok3333 [9.3K]

Established the Payment Error Rate Measurement (PERM) program to measure improper payments in the Medicaid program and the States Children's Health Insurance Program (SCHIP)

<h3>What is the Impact of Improper Payments Information Act (IPIA) ?</h3>

The IPIA mandates that agencies adhere to a variety of methodological parameters for computing mistake rates and improper payment estimates in order to achieve consistency in improper payment reporting across federal agencies. When reporting erroneous payment amounts and rates, one obligation is to use gross values. By combining underpayments and overpayments, a gross erroneous payment amount is determined. For consistency, historical figures that were initially provided as net numbers have been converted to gross numbers unless otherwise noted. Denied claims must also be included in the sample, according to the IPIA. For both the May and November reports, the CERT program includes rejected claims in its sample. Only the November report's findings were refuted by the HPMP samples. As a result, calculations for this May report used HPMP denied claims data from the November 2007 report.

To learn more about States Children's Health Insurance Program (SCHIP) , Visit:

<u>brainly.com/question/13034065</u>

#SPJ4

5 0
1 year ago
Question 6 options: This is a category or partitioned group of the small units of a programming language include its numeric lit
Wittaler [7]

Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

<h3>What is a lexeme in programming?</h3>

Lexemes are known to be those character strings that are put together from the character group of a program, and the token stands for what aspect of the program's grammar they are made of.

Hence, Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

Learn more about Lexeme from

brainly.com/question/14125370

#SPJ1

6 0
2 years ago
Other questions:
  • What is the education level of a majority of the Power, Structural, and Technical Systems workers?
    7·1 answer
  • PHP can be run on Microsoft Windows IIS(Internet Information Server):
    5·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • What is the purpose of the New Window command?
    7·2 answers
  • _______and ________ enables computers to communicate and it can pass information between two networks.
    15·1 answer
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
  • A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
    5·2 answers
  • The table shows the price of apples in the local market. What is the cost of 12 pounds of apples? Apples (pounds) Price (dollars
    13·1 answer
  • Which term means the push that makes electrons move in a wire?
    13·2 answers
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!