1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
12

An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa

ny's business. However, when attempting to access the drive's contents, the intruder is met with the company's authentication protocols and data encryption measures. What type of security is illustrated in this example?
Computers and Technology
1 answer:
solong [7]3 years ago
3 0

Answer:

firewalls and encryption

Explanation:

the company placed a firewall and an encryption code to the hard drive as a precaution against theft and malicious intent

You might be interested in
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not dro
prisoha [69]

Answer:

In binary signaling, Non Return to Zero (NRZ) is the technique in which zero voltage is represented by 0 bit while high voltage is represented by 1 until the voltage level change from high to low.

Explanation:

There are different techniques to encode the signal for transmission between transmitter and receiver. These techniques includes return to zero, non return to zero. In return to zero technique, the if the voltage is high the signal will become 1 for half of the time period and then after half time period it return to 0.

In NRZ the signal is 0 if the voltage level is zero. In case of high voltage of the signal the binary bit remains 1 until the next zero voltage level arrive in the signal until the end of the time period of bit.

6 0
4 years ago
Which of the following variable declarations is a correct assignment?
Gwar [14]

Answer:

Option D: double y = 82;

Explanation:

In Java programming, it is acceptable to assign an integer (lower type) to a double type (higher type) variable. By assigning an integer to double type variable using the "=" operator, the integer will be converted to double type implicitly. It is known as the implicit type casting.  

For example, <em>double y = 82</em> will convert integer 82 (integer) to 82.0 (double).

6 0
3 years ago
Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. Which stage of t
kodGreya [7K]

Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. The next stage for Keira is CODING.

Explanation :

  • SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.
  • SDLC involves several distinct stages, including planning, design, building, testing, and deployment. Popular SDLC models include the waterfall model, spiral model, and Agile model.
  • The steps of the SDLC are given below :
  • Identify the current problems. “What don’t we want?”
  • Plan. “What do we want?”
  • Design. “How will we get what we want?”
  • Build. “Let’s create what we want.” This SDLC stage develops the software by generating all the actual code. If the previous steps have been followed with attention to detail, this is actually the least complicated step.
  • Build is the phase which Keira should move onto in the SDLC
  • SDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal up front and see a clear plan for arriving at that goal. Everyone understands the costs and resources required.
7 0
3 years ago
Read 2 more answers
Which type of processing best describes the correction of errors or the rearrangement of a job's running time?
Neko [114]

Answer:

Real-time

Explanation:

i am sure because on my test it said corect

6 0
4 years ago
(Count the occurrences of words in a text file) Rewrite Listing 21.9 to read the text from a text file. The text file is passed
Oksanka [162]

Answer:

Explanation:

The following is written in Java. It uses File input, to get the file and read every line in the file. It adds all the lines into a variable called fullString. Then it uses regex to split the string into separate words. Finally, it maps the words into an array that counts all the words and how many times they appear. A test case has been created and the output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

3 0
3 years ago
Other questions:
  • Successful attacks are commonly called ________. a. security incidents b. countermeasures c. both a and b d. neither a nor b
    10·1 answer
  • It is important to avoid using a person’s title in an email to avoid offending him or her.
    9·2 answers
  • Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
    9·1 answer
  • Which of the following best describes when a packet is addressed so that more than one destination can receive it and the first
    11·1 answer
  • 4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
    11·1 answer
  • The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
    5·1 answer
  • Tom is trapped on the top floor of a department store. It’s just before Christmas
    13·2 answers
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • #include
    13·2 answers
  • ____________ is a process of reverse calculation to achieved a desired result. a. Data Consolidation
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!