1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
2 years ago
5

Buying a home security system is an example of protecting your home against________.

Computers and Technology
1 answer:
kow [346]2 years ago
5 0

Answer:

Risk

Explanation:

Edge 2021

You might be interested in
Need help with 4.7 lesson practice
OverLord2011 [107]

Answer:

1.a

2.sorry cant read it that wekk

3.c

Explanation:

7 0
3 years ago
Sandy has an entry-level position in a graphic design company. She wants to learn more about the company and the skills she shou
Yakvenalex [24]
The answer should have been B, what was the answer?
8 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
emmainna [20.7K]
To prevent others who use your worksheet from seeing the data you can hide column C
5 0
2 years ago
Jaden needs to implement a telecommunications technology that would most improve the way members of his team exchange informatio
Verdich [7]
<span>The fact that Jaden uses decision-making strategy means that he</span><span><span> will make his decision based on long-term goals and a longer term vision.</span> In order to implement a telecommunication technology that would most improve the way members of his team exchange information, Jaden first must determine the goals. </span>

3 0
3 years ago
Other questions:
  • How do I learn coding??? ​
    5·2 answers
  • If you specify a user without specifying a hostname, mysql will
    13·1 answer
  • What is Mars internal composition
    7·1 answer
  • The number of square units required to cover a surface.
    13·1 answer
  • Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
    13·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • Who can give me answer for this kinda urgent pls
    13·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choice
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!