Answer:
The answer is "Confidentiality".
Explanation:
Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.
- It applies to both the security of data from unwanted entities being obtained.
- It allows accessing sensitive data, which may be able to do so.
#1) An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
Answer: File Management System. Keeps track of where files are stored and determines how the files are stored following the operating system file allocation policies. It uses available storage space efficiently for files and creates a record/log of all file usage. It allocates a file to a user if is free, and if they are permitted access to it. Then de-allocates file when the user is finished with it.
Answer:
A downloaded executable file may contain harmful software know as malware.
Further details:
Malwares:
Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.
Uses:
Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.
Answer details:
Subject: Computer and technology
Level: College
Keywords:
• Harmful software
• Malware
• Malware software
• Uses of malware
• Purpose of malware
Learn more to evaluate:
brainly.com/question/4997492
brainly.com/question/4010464
brainly.com/question/1754173
// C++ switch
// It can also be used for JAVA, C#
switch(age){
// here age will be sent by the function in which it is used
// case to check the age<2
case(age<2 && age>0):
// printing the line
cout<<"ineligible";
// case to check the age ==2
case(age==2):
// printing the line
cout<<"toddler";
// case to check 3-5
case(age>=3 && age<=5):
cout<<"early childhood";
// case to check 6-7
case(age==6 || age==7):
cout<<"young reader";
//case to check 8-10
case(age>=8 && age<=10):
cout<<"elementary";
// case to check 13
case(age==13):
cout<<"impossible";
//case tocheck 14-16
case(age>=14 && age<=16):
cout<<"high school";
// case to check 17 or 18
case(age==17 || age==18):
cout<<"scholar";
//case to check >18
case(age>18);
cout<<"ineligible";
// default case
default:
cout<<"Invalid age";
}
Read more on Brainly.com - brainly.com/question/12981906#readmore
Answer:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int intgVal; double dblVal; char chrVal; String strVal;
System.out.print("Enter integer: ");
intgVal = input.nextInt();
System.out.print("Enter double: ");
dblVal = input.nextDouble();
System.out.print("Enter character: ");
chrVal = input.next().charAt(0);
input.nextLine();
System.out.print("Enter string: ");
strVal = input.nextLine();
System.out.println(intgVal+" "+dblVal+" "+chrVal+" "+strVal);
System.out.println(strVal+" "+chrVal+" "+dblVal+" "+intgVal);
int IntValue = (int) dblVal;
System.out.print("Cast to an integer: "+IntValue);
}
}
Explanation:
See attachment for complete program where comments were used to explain each line of the program