1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
15

What is a user data?

Computers and Technology
1 answer:
Rom4ik [11]3 years ago
7 0

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

You might be interested in
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
HELP!!!<br> THIS HAPPENS EVERY TIME
Lelu [443]
Idek but hope u figure it out!
4 0
3 years ago
Read 2 more answers
Which tectonic plate setting is associated with the following features: great earthquakes; explosive volcanic eruptions; oceanic
yarga [219]

Answer:

Convergent Plate Boundary (subduction zone)

Explanation:

A convergent plate boundary is a location where two tectonic plates are moving toward each other, often causing one plate to slide below the other (in a process known as subduction). The collision of tectonic plates can result in earthquakes, volcanoes, the formation of mountains, and other geological events. An example is the one the formed Andes Mountain.

Cheers

8 0
3 years ago
____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
Sati [7]
The Answer to this question is Web Bugs
8 0
3 years ago
Some of the drawbacks to the effectiveness of NSM include all of the following, except which one?
Sunny_sXe [5.5K]

Answer:

The answer is B: Differences in operating systems between the NSM server and other servers

Explanation:

All the evils on your network can be conquered effectively with the proper use NSM. NSM data equips CIRTs to detect and respond to cyber- attacks. With NSM, security analysts are able to discover intrusions early on in the process. Having highlighted all these positives, NSM encounters difficulties when faced with all of the above options apart from B.

5 0
3 years ago
Other questions:
  • What are the set of rules to move data from one computer to another?
    11·1 answer
  • laire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of t
    11·1 answer
  • 3. The term integration refers to the ability to
    6·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • What quantities are measured by the following sensors:
    9·1 answer
  • Purpose for a Phone....?
    15·2 answers
  • Python is an example of a low level programming language true or false?​
    14·1 answer
  • Create a view named MAJOR CUSTOMER. It consists of the customer number, name, bal. ance, credit limit, and rep number for every
    12·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • Four ways to improve the performance of a hard disk include.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!