1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
15

In computer science, what does the word security mean?

Computers and Technology
1 answer:
zepelin [54]3 years ago
4 0

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

You might be interested in
The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
Free_Kalibri [48]

Answer:

Vigenère

Explanation:

It is a method of encrypting alphabetic text by using a form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, ie using multiple substitution of alphabets. The encryption is done using a Vigenère table.

To encrypt a message using the Vigenère Cipher you choose a keyphrase. Then repeat this keyword over and over until it is the same length as the original text; this is referred to as a keystream.

4 0
4 years ago
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
Vika [28.1K]

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

7 0
3 years ago
Write a 3-4 page paper (500-800 words) about your project that explains your project, the type of conditioning you used, and the
sleet_krkn [62]

Answer:

Following are the responses to the given question:

Explanation:

I have decided to take up my project as a change in my behavior of not working out and exercising on daily basis. To execute this project, I decided to use ‘Operant conditioning’ to be able to complete it successfully. The reason for choosing this as my project is to be able to change my unhealthy behavior of not exercising daily, which is now having an impact on my weight as well as on my mind.

Operant Conditioning is also known as instrumental conditioning was used by the behaviorist B.F Skinner. Through operant conditioning, Skinner explained how we adapt to several learned behaviors in our everyday life. Its idea of such conditioning would be that the acts that accompany reinforcement will most likely occur in the future.

They may call it a punishment for actions and retribution. A relationship is formed between that action as well as its consequences. I began my project with an order of a watch to keep track of my daily workout and even downloaded a phone-based software to track my calorie each day. The concept behind it was to understand my everyday work and my calorie consumption because these variables inspire me to choose more to achieve my aim to practice and maintain my weight safely.

So, to find any way to miss it I did the routine calendar. We also made a small and comprehensive strategy for the first few weeks such as early awakening and 10 minutes getting warmed up. I concentrated on the operating conditioning function and reaction. I've been honored by enjoying my important topics for one hour every week that I finished my practice according to my planned routine. I wanted and award myself quarterly rewards in addition to daily rewards. When the goal of a daily exercise is also achieved, I decided to go out to my favorite coffee just at end of November.

It's not a matter of giving one of my favorite stuff to my cousins to affirm my everyday life except for one year within a week (except when I'm unwell). The fear of missing one of my items that I'd always agreed only at beginning of the week prevented me from achieving my target of exercise every day and made me very content to go to my favorite coffee shop. It made it more motivating for someone like me to proceed with the positive and negative reinforcement of doing my everyday exercise routine. I also get used to my fresh and safe routine every day, but also the results are impressive.

Even though I don't feel about rewarding myself with something that I like, I am very much happy because of the positive result which I have a fit body and maintain a healthy lifestyle. Those who removed my daily positive and negative exercise reinforcements, as well as the monthly incentive, could not be required in the future. Moreover, I can work on a closer look for 6 abs.

5 0
3 years ago
A set of communication rules for the computer to follow is called, what?
Irina-Kira [14]

The answer to this question is protocol

5 0
3 years ago
Read 2 more answers
Before a program written in c can be executed on a computer, what step is required to be done first?
sergejj [24]
It should be compiled. It won't work if it's not compiled.
6 0
4 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Why was the term personal computer created?
    5·1 answer
  • What is the internet?
    5·2 answers
  • . Database connectivity software is also known as:
    11·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is lis
    13·1 answer
  • Which is an aspect of structural-level design?
    6·2 answers
  • Describe how the presence or absence of balance can affect a visitor’s perceptions of a Web page.
    7·1 answer
  • In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set M
    11·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!