1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ierofanga [76]
3 years ago
5

An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa

ny's business. However, when attempting to access the drive's contents, the intruder is met with the company's authentication protocols and data encryption measures. What type of security is illustrated in this example?
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
8 0

Answer:

firewalls and encryption

Explanation:

the company placed a firewall and an encryption code to the hard drive as a precaution against theft and malicious intent

You might be interested in
If the user enters 26 what is output? _____________
MArishka [77]

Please write the whole question, is it asking for the function that requests user input?

3 0
3 years ago
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
Rudik [331]

Answer:

The account record comprises of Invoice roll up summary fields.

Explanation:

The possible reason that this change was not permitted was that the account record comprises of Invoice roll up summary fields.

Invoice roll up summary fields: A roll-up summary field computes values from associated records, for example those in a linked list. a person or someone ca design a roll-up summary field to show a value in a master record by building  the values of fields in a particular record.

The detail record must be associated to the master through a master-detail relationship. for instance, you want to show the sum of invoice amounts for all linked custom object records in an account’s Invoices related list. you can show the whole or sum in a custom account field refereed to as Total Invoice Amount.

4 0
3 years ago
To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
Strike441 [17]
Format because it changes the look


5 0
3 years ago
Read 2 more answers
It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
Andreyy89

Answer:

Regular Basis.

Explanation:

The plans should be clearly defined and checked regularly according to the set parameters. Also, there needs to evaluate one every week various types of environmental assessment have to be done. As the Disaster Recovery is a set of policies procedures and tools one needs to keep it updated to the current version. As any business needs to operate.

8 0
3 years ago
Other questions:
  • Collaboration, listening, and negotiating are considered __________ skills.
    7·2 answers
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • Modern ancestor of the typewriter
    12·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices such as a car.
    11·1 answer
  • You can change the size of text using which block of code?
    11·1 answer
  • Discuss the term business information SYSTEMS ​
    15·1 answer
  • Who invented slide Rule and when?​
    7·2 answers
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • Who would benefit from using self-driving cars
    10·2 answers
  • What is ICT?Write down the uses of ICT​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!