1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
10

In computer science what are the methods used to protect the information stored by a piece of software called?

Computers and Technology
1 answer:
Nezavi [6.7K]3 years ago
3 0

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

You might be interested in
A loop that will output every other name in the names list.
Nuetrik [128]

Answer:

names = ['Peter', 'Bruce', 'Steve', 'Tony', 'Natasha', 'Clint', 'Wanda', 'Hope', 'Danny', 'Carol']

numbers = [100, 50, 10, 1, 2, 7, 11, 17, 53, -8, -4, -9, -72, -64, -80]

for index, element in enumerate(names):

if index % 2 == 0:

 print(element)

for num in numbers:

 if num >= 0:

   print(num, end = " ")

count = 0

for i in numbers:

 count += i

avg = count/len(numbers)

print("sum = ", count)

print("average = ", avg)

for num in numbers:

 if num % 2 != 0:

   print(num, end = " ")

Explanation:

I'm stuck on the last two.. I have to do those too for an assignment.

4 0
3 years ago
Which of the following is CORRECT about database managementsystem's languages?
scZoUnD [109]

Answer:

Data manipulation languages are used for the retrieval of the,insertion,deletion and modification of data.

Explanation:

Data Manipulation Languages(DML) are used to insert,delete,update,modify the data in the database.

The commands used to do these operations are as following:-

INSERT INTO :-This command is used to insert values in the database.

DELETE:-It is used to delete existing records from the table.

UPDATE:- It is used to modify the records in the table.

SELECT:- It is used to select data from database.

3 0
3 years ago
after clicking the start button on your computer screen desktop what option would you then select to examine systems components
xenn [34]
You would click on control panel to get to that area
7 0
3 years ago
When working with tables, if I wanted odd and even rows to be formatted differently, I would select the ___ option from the Tabl
coldgirl [10]
I would say that It is the Banded rows option.
8 0
3 years ago
________ states that the value of a network is equal to the square of the number of users connected to it.
Juliette [100K]

Answer:

This is known as the Metcalfe's Law

Explanation:

In 1980, Metcalfe's law was first presented, not considering users but the communication among compatible devices (e.g. telephone, fax machines and so on). It was after the globalization of the internet that the law got introduced to users and networks.

A demonstration of the law can be seen in fax machines, one fax machine is purposeless, however, the interconnection of multiple fax machines on the network increases the value of every fax machine because the number of the users of the fax machines increases. Similarly, the more the users of a particular service, the more relevant the service becomes.

8 0
3 years ago
Read 2 more answers
Other questions:
  • How to go to a website with an ip address?
    15·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • How does a hard drive work
    15·1 answer
  • Recursion is a natural use for a _____ (stack or queue)
    13·1 answer
  • Joe, a user, wants his desktop RAID configured to allow the fastest speed and the most storage capacity. His desktop has three h
    12·1 answer
  • What are 3 important reasons to reconcile bank and credit card accounts at set dates?
    15·1 answer
  • Where are parameters such boot order, processor voltage, motherboard raid, hardware virtualization support, and overclocking con
    7·1 answer
  • One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are r
    8·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • Raina remembered when she taught Amara to draw. What happened?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!