1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
11

Which of the following restricts the ability for individuals to reveal information present in some part of the database?

Computers and Technology
1 answer:
Anni [7]3 years ago
8 0

Answer:

it would have to be flow control which would be C.

Explanation:

You might be interested in
The was the series of events that marked the start of the Information Age
Artyom0805 [142]

The Information Age was the series of events that marked the start of the Information Age

Further Explanation:

I would simply put digital revolution as the gradual shift of technology from analogue to what is now known as digital technology. This sort of a paradigm shift began somewhere between the late 1950s to the late 1970s and has continued to this day. In a span of only 50 years, digital revolution has advanced tremendously and it is yet to start. The Digital Revolution marked the beginning of the Information Age.

The Information Age or the computer age as many would put it is what defines this shift. The invention of transistors, chips and the internet revolutionized the modern world and brought about the birth of information age. It is what connects us to the human civilization. Scientists capitalized on digital micro-miniaturization and as a result formed the Information Age. It is here with us and its sole existence has been embraced by billions of people worldwide.

Learn more about information age

brainly.com/question/10028333

brainly.com/question/10385855

#LearnWithBrainly

7 0
3 years ago
Which file types have .exe and .png as their extensions?
uysha [10]
.png are for photos and .exe are for programs.
6 0
3 years ago
Read 2 more answers
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
Which type of collaborative tool allows people to communicate using the
frosja888 [35]
D because people can communicate using video conferencing
7 0
3 years ago
Which one of the following sstatements suggests a good method
PilotLPTM [1.2K]
The 2nd onnnnneeeeeee
7 0
3 years ago
Other questions:
  • Write a single c statement to read an integer from the keyboard and assign it variable "num"
    6·1 answer
  • How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
    10·1 answer
  • In JavaScript, which of the statements below can be used for string declaration?
    11·1 answer
  • Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
    5·1 answer
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • An international package shipping company like FedEx needs to be able to track the location of every package at every stage in t
    9·2 answers
  • Which of the following is true about media production? A. All media elements contain a certain type of editorial viewpoint. B. P
    10·1 answer
  • Which of these are steps in the testing cycle? Check all of the boxes that apply.
    10·2 answers
  • Identify the reasons that numeric data representation is important to computer programmers. Check all that apply.
    12·2 answers
  • Why are business types of profession interrelated?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!