Answer:
d. integrity
Explanation:
Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.
Answer:
1. There are many ways to write an algorithm. Some are very informal, some are quite formal and mathematical in nature, and some are quite graphical. The instructions for connecting a DVD player to a television are an algorithm. A mathematical formula such as πR2 is a special case of an algorithm. The form is not particularly important as long as it provides a good way to describe and check the logic of the plan. The development of an algorithm, a plan is a key step in solving a problem. Once we have an algorithm, we can translate it into a computer program in some programming language. Our algorithm development process consists of five major steps.
2. computers only do what you told them to do, so If you wrote something wrong or you wasn't precise enough it might cause a massive damage and cause you to lose a lot of money.
3. You know when a problem should be solved whenever you need to make a decision that is important, or requires human intelligence and a computer doesn’t have human intelligence.
4. The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.
5. The brain uses chemicals to transmit information; the computer uses electricity. Even though electrical signals travel at high speeds in the nervous system, they travel even faster through the wires in a computer. Both transmit information. A computer uses switches that are either on or off ("binary").
Answer:
Copyright.
Explanation:
Trademark is used to protect company names and logos, copyright is for inventions and programs etc.
Explanation:
1. We cast our phones to our televisions so we can see our phone screen on the t.v. This is helpful to society as it exterminiates the need for extra, unnecessary wires connecting to the t.v.
2. We use technology to secure our homes. Many people have even exchanged a door key for a pad lock. This is helpful in the essence that we no longer need to worry about losing our keys, but it is harmful in that pad locks can be easily broken into as opposed to a house key which takes more time. For instance, there is an app where it shows you heat signatures in different colors depending on time. You can easily access a pad locked door by using this app.
3. We pay expenses through our phones (such as eChecks or Applepay) which is helpful in that it makes life easier and quicker, but harmful in that it allows easy access for hackers as well as identity theft. After all, it's not difficult for a hacker or even just an enemy of yours to decrypt a simple password or pin on your phone, especially when people leave their phones exposed in their back jean pockets and are constantly losing their phones in general.
WEP provides no mechanism for automatically changing the shared secret.
Hope this helps :)
~Davinia.