1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
a. Encryption.
b. Truncation.
c. Hashing.
d. Masking
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

You might be interested in
daniel wants to buy a computer to use for playing games after work. he loves racing games and wants to make sure his device has
kirza4 [7]

The factors which should be considered by Daniel are the RAM capacity and the Processor Core of the computer.

Computer games especially racing and football games are usually memory intensive and as such will require a good amount of RAM in other to ensure that the game runs smoothly as the RAM provides a temporary storage required for applications or programs to run smoothly.

Also, the processor core has to be put into consideration, Daniel will need a multi - core processor in other to aid the smooth running of his racing game.

Therefore, the factors that should be considered are the RAM and processor core.

Learn more :brainly.com/question/25010930

5 0
2 years ago
Describe all the main stress causal agents​
LekaFEV [45]

Answer:

Causes of Stress

Being unhappy in your job.

Having a heavy workload or too much responsibility.

Working long hours.

Having poor management, unclear expectations of your work, or no say in the decision-making process.

Working under dangerous conditions.

Being insecure about your chance for advancement or risk of termination.

5 0
3 years ago
Hard disk works on the following technologies: (i) Technology used within the hard drive to read & write data to the drive a
Alex787 [66]

Answer:

The green-blue circuit board you can see in the first photo includes the disk controller, a circuit that allows the computer to operate the drive's mechanisms and read/write data to and from it. ... A small hard drive typically has only one platter, but each side of it has a magnetic coating

Explanation:

8 0
2 years ago
1. Very short questions.(any four) 14)<br>a. Write down the working principle of a computer.​
Oxana [17]

Answer:

The answer is below

Explanation:

Computer System is widely known for its ability to perform its functions faster by giving out information.

The computer system operation follows certain principles, some of which are:

1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.

2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system

3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.

4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.

6 0
3 years ago
Consider the key success factors of B2C. Is it only IT? What is most important?​
Ad libitum [116K]

Jsjfu zzer jsusuc888 kksss

6 0
2 years ago
Other questions:
  • Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
    12·2 answers
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
    14·1 answer
  • When an interrogator speaks highly about how a crime was committed, hoping to get the suspect to brag about his or her involveme
    7·2 answers
  • When was internet started in which year​
    13·2 answers
  • A(n) __________ is a server with the original copy of the data that others need.
    12·1 answer
  • Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
    10·1 answer
  • File
    10·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!