1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
12

If you are going to analyze and interpret data, you need to do all of the following execept blank.

Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
3 0

Answer:

the answer to the question is C

You might be interested in
All of these issues are results of data integrity problems except ________.
Dvinal [7]

If there is an issue with the integrity of data the only one that will not be an issue is; The system will give users too much information.

<h3>What is Data Security?</h3>

Data Security is defined as a security service that deals with identifying any alteration to the data. This is as a result of the data getting modified by an unauthorized entity either intentionally or accidentally.

Now, data security is also called data integrity is simply the safety of data and from the options given if there is an issue with the integrity of data the only one that will not be an issue is  the system will give users too much information. because it is not a function of breach of data security.

Read more about data security at; brainly.com/question/4688296

8 0
3 years ago
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
salantis [7]
The correct answer is letter b
8 0
3 years ago
Read 2 more answers
Before sending a packet into a datagram network, the source must determine all the links that packet will traverse between sourc
Llana [10]

Answer:

False

Explanation:

The transport layer is found in both OSI and TCP/IP suite model. It segments and propagates packets across a network. TCP and UDP are protocols in this layer.

UDP is a connectionless protocol, that is to say, it needs no connection for transmission to take place. UDP transfer is unreliable as packets lost are not retransmitted. Unlike the TCP, it's header is smaller and it is faster in transmission, and links to destinations are random and not determined by the source.

3 0
3 years ago
Ehred is a network technician for a hotel chain and has been notified that one of the locations is having issues with the guests
Ray Of Light [21]

Option a is correct. Captive portal issues is might best describe the issue occuring in this hotel.

Before newly connected users of a Wi-Fi or wired network are given full access to network resources, they are first shown a captive portal, which is a web page that can be accessed via a web browser. Authentication, payment, acceptance of an end-user license agreement, adherence to an acceptable usage policy, completing a survey, or other valid credentials that the host and user agree to abide by may be required when presenting a landing or log-in page through a captive portal.

Cable, commercially available Wi-Fi, and home hotspots are just a few of the mobile and pedestrian broadband providers that utilise captive portals. Access to residential or corporate wired networks, such as those in apartment buildings, hotel rooms, and business centers, can also be provided by a captive gateway.

To know more about captive portal click here:

brainly.com/question/14280680

#SPJ4

5 0
1 year ago
Read 2 more answers
What command would you use to list the text files in your fileasst directory (using a relative path)??
antiseptic1488 [7]
*nix: ls -l fileasst
DOS: dir fileasst
6 0
4 years ago
Other questions:
  • Computers use two different types of memory to operate.
    10·2 answers
  • Brainiest<br><br> What do you think should be done for the people whose jobs become automated?
    10·2 answers
  • Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common g
    10·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • Write the definition of a function named swapints that is passed two int variables. The function returns nothing but exchanges t
    8·1 answer
  • You’ve found the file you’ll be working with. Next, you decide to move the file to your Desktop so it will be easier to get to i
    14·1 answer
  • ¿Cuánta energía consumirá una lavadora de 1200W de potencia, si se deja conectada durante 20 horas? ¿Cuánto deberemos pagar si e
    7·1 answer
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • Why is cyberbullying so devastating to many people beyond just the victim?
    8·1 answer
  • What are some limitations when it comes to testing and ensuring program quality? List at
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!