1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
4 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
a. Encryption.
b. Truncation.
c. Hashing.
d. Masking
Computers and Technology
1 answer:
enyata [817]4 years ago
5 0

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

You might be interested in
Convert the following MIPS instruction to its binary and hex representations by doing the following: On first line, type registe
Firdavs [7]

Answer:

To make the group of four we can write 100011 as 00100011

Now, the two groups are:- 0010 and 0011

And 0010 in binary corresponds to 3 in Hexadecimal

And 0011 in binary corresponds to 4 in Hexadecimal.

So, 100011 of binary corresponds to 34 of hex.

3 0
4 years ago
What will be the value of input_value if the value 5 is input at run time?
Lunna [17]

Answer:

15

Explanation:

The if else state is used for checking the condition and if the condition is TRUE and program can execute the statement  within the if else.

Initially input_value is 5

then the if statement check the condition 5>5, condition FALSE because 5==5

it not less than 5.

then program move to else if and check condition 5>2, condition TRUE.

then, input_value = 5 + 10=15 execute and update the value to 15.

After that, program terminate the if else statement.

Therefore, the answer is 15.

5 0
4 years ago
In this assignment you will be building an implementation of the hypothetical machine simulator like the one discussed in chapte
olga nikolaevna [1]

Explanation:

nn n ncnxjxkxjxbxbxbxnxnxjd

5 0
3 years ago
Alicia has filed a complaint regarding a serious hazard that could result in a fatality or serious injury. How will OSHA most li
Galina-37 [17]

osha will insist that the hazard be removed within x amount of time. if there is no compliance,the company will face a hefty fine and possible closure of a facility.

4 0
3 years ago
Read 2 more answers
Google owns the internet backbone true or false
Deffense [45]

Answer:

False

Explanation:

They own a large chunk of it

<em>Hope this helped</em>

6 0
4 years ago
Other questions:
  • Slmething about device for defrosting windscreen?
    5·1 answer
  • Which of the following is not one of the most common causes of electrical accidents ?
    8·2 answers
  • Which is the most used operating system? A. Windows B.Linux C.Leopard D. DOS
    14·2 answers
  • According to the text, ________________, although not considered a crime, is viewed as a grave public wrong in many jurisdiction
    10·1 answer
  • The roman structure that features heavy use of arches and columns is the _______.
    6·1 answer
  • The software maintains and manages information related to employees, rooms, committees, and committee meetings of a company. The
    9·1 answer
  • How do u reverse image search on Android? ​
    9·1 answer
  • To reposition the legend to the left-hand side of a chart, click the _________ button, point to legend, click the right arrow ic
    7·1 answer
  • Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists
    7·1 answer
  • Why is it important not to leave your personal information on a public computer?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!