1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
2 years ago
6

What type of data causes concern for institutions or business when collected, stored, and not secured properly

Computers and Technology
1 answer:
expeople1 [14]2 years ago
4 0

Answer:

personal identeifying information

Explanation:

hope this is right and it helped

You might be interested in
Suppose you are choosing between the following three algorithms:
Pavel [41]

Answer:

Algorithm C is chosen

Explanation:

<u>For Algorithm A </u>

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

6 0
3 years ago
Write an application that prompts a user for two integers and displays every integer between them. Display There are no integers
olga2289 [7]

Answer:

x = int(input("Enter an integer: "))

y = int(input("Enter another integer: "))

if x > y:

   for number in range(y+1, x):

       print(number, end=" ")

elif y > x:

   for number in range(x+1, y):

       print(number, end=" ")

else:

   print("There are no integers between {} and {}".format(x, y))

Explanation:

*The code is in Python.

Ask the user to enter the two integers, x and y

Since we want our program to run regardless of which entered value is larger, we need to compare the numbers to be able to create the loop that prints the numbers.

Check if x is greater than y. If it is, create a for loop that iterates from y+1 to x-1 and print the numbers

Otherwise, check if y is greater than x. If it is, create a for loop that iterates from x+1 to y-1 and print the numbers

If none of the previous part is executed, print that there are no integers between

4 0
3 years ago
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Marien is using the Council of Science Editors (CSE) style guidelines to write her research paper. What is her most likely topic
slega [8]

(CSE) style is used in scientific research papers. In this style there are three systems of documentation, but all of them are appropriate styles to write a scientific paper and make proper references to them. Although all could in some context be taken as scientific, only one really pops out and that's biology.

3 0
4 years ago
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • If the task is to write firewall specifications for the preparation of a(n) ____, the planner would note that the deliverable is
    14·1 answer
  • Jesse wants to create a website with her company name as the address. What should she do next?
    9·1 answer
  • Which of the following is an example of joint problem solving?
    12·1 answer
  • They are correct? thank you!
    5·1 answer
  • Write a program that ask a user to input radius of a circle and display circumference of a circle
    13·1 answer
  • What are the two types of commennts of java​
    12·1 answer
  • Read the following statements and select the
    5·2 answers
  • The ________ is specifically designed for situations requiring a counter variable to control the number of times a loop iterates
    8·1 answer
  • Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!