1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
3 years ago
8

What steps might a company or organization need take in order to keep its digital data secure online?

Computers and Technology
1 answer:
serious [3.7K]3 years ago
7 0

Answer: Encryption & Offsite storage.

Explanation: Encryption with a secure hash and password is one of the best ways to keep data safe and keeping the most private data on a secure cloud database somewhere not at your location where people could potentially steal it off a desk or off a company computer is always a good but not necessary way to solve this problem.

You might be interested in
A data type consisting of numbers, letters and symbols is a _____.
LekaFEV [45]

Answer:

That's the answer

Hope it helps

#brainliest

#heart

#star

#Carryonlearning

4 0
2 years ago
Write a program that reads a series of strings andprints only those strings beginning with the letter "b."
coldgirl [10]

Answer:

#include <iostream>

using namespace std;

int main()

{

char str[100][20];

int n;

cout<<"Strings you want to enter"<<endl;

cin>>n;

cout<<"enter n strings"<<endl;

for(int i=0;i<n;i++)

cin>>str[i];

for(int i=0;i<n;i++)

{

if((int)str[i][0]==98) //ascii value b is 98

cout<<str[i]<<endl;

}

return 0;

}

Explanation:

The above written code is for printing the strings which starts with the letter b.

To check if the string starts with a letter b we are checking the ascii value 98 which corresponds to b and then printing those strings.

6 0
3 years ago
Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based
Amanda [17]

Answer:

Infrastructure as a service(Iaas)

Explanation:

Infrastructure as a service(Iaas) is used to provide hardware,storage,servers and datacenter space or network components

4 0
3 years ago
The ________ is a keyboard form based on the principle of voices imitating each other.
Brut [27]

A fugue is a keyboard form founded on the principles of voices imitating each other.

What is a fugue?

In theme, a fugue is a contrapuntal compositional process in two or more voices, built on a topic (a musical theme) that is presented at the beginning in imitation (repetition at other pitches) and which recurs often in the course of the design. It is not to be misunderstood with a figuring tune, which is a style of a song popularized by and mostly limited to early American music and West Gallery music. A fugue usually has three main areas: an exposition, a story, and a final admission that includes the return of the issue in the fugue's remedy key. Some fugues have a recapitulation.

To learn more about fugue, refer to:

brainly.com/question/1132239

#SPJ4

The complete question is:

The ________ is a keyboard form based on the principle of voices imitating each other.

a. fugue

b. prelude

c. suite

d. toccata

7 0
1 year ago
Jason is working on a video image. He wants to add a small blur effect in a part of the video, but does not want to damage the v
romanna [79]
<span> Jason can use the filter tool to edit while maintaining the original content of the file.</span>
6 0
3 years ago
Other questions:
  • Which shortcut key aligns text to the center of a page?
    13·2 answers
  • What is a computer ?it types​
    11·2 answers
  • Which of following allows you to share a file with someone that is too large to send via e-mail?
    5·1 answer
  • How long does a bankruptcy affect your financial reputation
    13·1 answer
  • Gabe wants to move text from one document to another document. He should _____.
    9·2 answers
  • A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network v
    8·1 answer
  • What is the purpose of a email
    11·2 answers
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • Which application software would be most suitable for writing a resume?
    8·1 answer
  • Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!