1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she

sees values that look like this: "XXX-XX-9142." What has happened to these records?
a. Encryption.
b. Truncation.
c. Hashing.
d. Masking
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

You might be interested in
Write any four common hardware devices​
marishachu [46]

Answer:

Input devices: For raw data input.

Processing devices: To process raw data instructions into information.

Output devices: To disseminate data and information.

Storage devices: For data and information retention.

8 0
3 years ago
Suppose an 80286 microprocessor is in protected mode. How it is switched back
iris [78.8K]

Answer:

  hardware-initiated reset

Explanation:

Once in protected mode, the 80286 is designed to remain there until it is reset by hardware.

__

External hardware can be designed so that software can cause such a reset. In the 1984 PC/AT, such hardware combined with code in the BIOS allowed real mode re-entry and returned execution control to the program that caused the reset.

5 0
3 years ago
What is payload?
Elina [12.6K]

Answer:

a block of data inside the paket

4 0
3 years ago
Write a note on secondary storage​
slega [8]

Answer:  Storage devices are non-volatile devices. That means that when the power is removed from them, for example, when you switch your computer off, they retain their contents (unlike RAM, which is volatile – it loses its contents). You can then retrieve the contents next time you switch your computer on. Storage devices can be used to hold operating systems, applications and files, amongst other types of software. They are simply big suitcases – used only for storage. We have already seen that when you want to use an application kept on a storage device, it has to be moved to RAM before you can start using it. This applies to the operating system, your files and any other category of software. For this reason, RAM is sometimes known as Primary Memory whereas storage devices are often referred to as Secondary Storage devices.

8 0
3 years ago
If you play video games, please answer these questions it’s for a survey for my game development class!!
yarga [219]

Answer:

Doom, fortnlte, mlnecraft, ark survival evolved, ark survival of the fittest, terraria, raft, among us, ect.

First person shooters, Third person shooters, Creative games

8-10 years

More VR, better graphics, more realistic

Maybe, not anytime soon.

Explanation:

5 0
2 years ago
Other questions:
  • A network administrator has statically configured the LMI type on the interface of a Cisco router that is running Cisco IOS Rele
    7·1 answer
  • One purpose of the dual ignition system on an aircraft engine is to provide for?
    7·2 answers
  • What is better for the sd card use as portable storage or use as internal storage?
    15·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • Part 2: a) Write VHDL code for a top module that invokes necessary components to display the four decimal digits on four seven-s
    5·1 answer
  • Who here would like to play among us with me? <br> Time: Friday, November 13
    14·1 answer
  • In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
    11·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • What if you accidentally delete your browser history
    7·1 answer
  • Question 2 of 10
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!