1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
4 years ago
12

What is a mask used for? What is a format used for? Which can affect the way that data is stored?

Computers and Technology
1 answer:
scoray [572]4 years ago
3 0

Answer:

 Mask is the process of replacing and changing the sensitive information and data element from the stored data so, the given structure in the data remain the same while the data itself change for protecting the sensitive information or data in the system.

This process is commonly known as data masking. The main purpose of mask is that it protecting the information or data.  

Format is the process of specify the bits for using in the digital storage and it is mainly used for encoding the information and data. It basically designed for formatting the document so that it can store in the media with the proper format in the computer system.

You might be interested in
How to achieve competitive advantage using information systems models
Maurinko [17]

Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

<h3>What is competitive advantage?</h3>

Competitive advantage is known to be that  factors that helps a firm to produce goods or services better or relatively more cheaply than their counterparts.

Note that in the case above, Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

Learn more about competitive advantage from

brainly.com/question/14030554

#SPJ12

4 0
2 years ago
The counting function uses only ___________________ arguments
rusak2 [61]

Answer:

The counting function uses only <em>the list of </em>arguments.

8 0
2 years ago
Company A’s IT department has a hosting platform specifically for systems used by the company’s large marketing department. This
agasfer [191]

Answer:

cloud has the On demand and ubiquitous access characteristics

Explanation:

The specific characteristics of cloud that would be helpful for his problem to be addressed is the fact that cloud offers on demand usage and ubiquitous access.

What is meant by on demand access is that the cloud customer can pay for cloud services and use them whenever they are needed. As long as the cloud service is authorized.  

By Ubiquitous access it means that the cloud customer has reliable access without the presence of any form of disturbances or issues and it can be accessed from anywhere. Different range of devices are supported on the cloud platform and with the presence of internet lots of services can be accessed.

Based on the issues being faced by customers, this characteristics of cloud will be useful to address the problems.

6 0
3 years ago
The three main types of banks (Large Traditional, Credit Union, Online or Online-Only) have many tradeoffs with respect to techn
Margarita [4]
So from a little research, this is the order:
Online Bank, Credit Union, Traditional Bank

Online bank is the highest one since it uses technology like the internet to transfer money or to pay bills easily.
Credit union is same as an online bank where it also uses internet offering mobile and online banking services.
Traditional bank is the most common type of bank. They also offer mobile banking but they still use the old procedure of banking like depositing and withdrawing money, face to face.
5 0
3 years ago
Read 2 more answers
Match each item with a statement below. - A parameter in a method header. - A set of methods that can accept a call given the pa
Bas_tet [7]

Answer:

                                 

Explanation:

6 0
3 years ago
Other questions:
  • Which of the following represents the bus topology? Multiple Choice All devices are connected to a central device, called a hub.
    8·1 answer
  • A workplace is where people _____. a. do work b. find new jobs c. go when they are unemployed d. read advertisements for job ope
    15·1 answer
  • In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, p
    10·1 answer
  • What is logical memory?
    15·1 answer
  • Explain the working principle of computer? can anyone tell​
    14·1 answer
  • Write any three type of looping structure with syntax​
    13·1 answer
  • Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase
    10·1 answer
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
  • In which cipher method are values rearranged within a block to create the ciphertext?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!