1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
2 years ago
7

Personal information in the computer can be viewed and stolen

Computers and Technology
1 answer:
agasfer [191]2 years ago
6 0
If that’s a true or false question it’s true.
You might be interested in
Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
Cloud [144]

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

3 0
2 years ago
Which structures protect the cell? Select two options.
Rzqust [24]

Answer:

cell wall

cell membrane

3 0
2 years ago
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
1 year ago
How do companies use web sites?
kramer

they us websites to look thing up that are need

hope this helps

5 0
3 years ago
Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?
natali 33 [55]
The answer is c post office protocol version 3 (POP 3)
7 0
2 years ago
Other questions:
  • Which of the following is important to do when downloading a game to your
    8·1 answer
  • Write a function called printbackwards() that will work with a c++ string
    14·1 answer
  • Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
    11·1 answer
  • These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
    14·1 answer
  • Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
    14·1 answer
  • Why is it important to be part of a team in times you fail and in times you succeed?​
    15·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • What is the name of the FOLDER in which the file named "script" is contained?
    13·1 answer
  • Well the last week has been kind of terrible...
    9·2 answers
  • Microsoft word is an example of utility software? <br><br>A.true <br>B.false​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!