1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
13

What is data intergrity​

Computers and Technology
1 answer:
Nataly [62]3 years ago
7 0

Answer:

The reliability and trustworthiness of data throughout its lifecycle.

Explanation:

In its broadest use, data integrity refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.

You might be interested in
Computer viruses often spread by means of what?
lozanna [386]
Email attachments hope this helps
8 0
3 years ago
Read 2 more answers
The question is provided in the image below.
Vladimir [108]

Answer: b

Explanation:

3 0
2 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Discuss any five focus areas<br> for Green Computing you can concentrate on
BaLLatris [955]

Answer:

Five focus areas for Green Computing are:

  1. Environmental conditions
  2. Information technology (IT) systems
  3. Cooling systems
  4. Electrical systems
  5. Air management systems

Explanation:  

Green computing refers to the art of managing very effectively information technology such that the current level of productivity is maintained or exceeded.

Many of the factors listed above are more typical to data centers.

Data centers are IT systems that consume lots of electricity whilst generating lots of heat.

Sustained over a long period of time, the heat generated will contribute to green-house gases as the cooling system that is required to keep the data houses cool are big.

Hence, the green computing protocol requires where possible, minimal electricity be expended in cooling the data warehouses.

Another suggestion that has been given is for systems and appliances to be shut down when not in use rather than being left on or on standby.

Cheers

8 0
3 years ago
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • Is the percentage of the original sample that successfully completed a survey.
    10·1 answer
  • If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
    5·1 answer
  • John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
    14·2 answers
  • The processor of a computer communicates to the other parts of the computer through a code that consists of what?
    9·1 answer
  • WILL MARK BRAINILY!!
    9·2 answers
  • How do ACLs work on a router?
    14·1 answer
  • What order? (function templates) Define a generic function called CheckOrder() that checks if four items are in ascending, neith
    14·1 answer
  • What are the 7 c s of communication​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!