1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
2 years ago
10

In computer science what are the methods used to protect the information stored by a piece of software called?

Computers and Technology
1 answer:
Nezavi [6.7K]2 years ago
3 0

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

You might be interested in
What is anatomy of software house?
alexira [117]

Answer:

2. All reports of software house.

Explanation:

A software house is a business providing software products mainly. These firms may be specialized in products for company or consumer software or software-as -a-service (SaaS). The popular definition is that the firm is invested primarily in software product development and distribution.

In anatomy of software house they include-

  • Software development
  • Finance report
  • Client report
  • Sales and marketing report

It consist all reports like finance,client,sales or development of software house.

4 0
3 years ago
A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
kotegsom [21]

Answer:

The correct answer to the following question will be "Valid-code test".

Explanation:

Even though no significance labels (including a standardized test score parameter) exist, valid data input codes or protocols could still be defined by having to type the correct codes as well as ranges.

  • To diagnose the given mistake, a valid code review will be the strongest internal control audit to incorporate into the organization's computer program.
  • To insert valid code the syntax is: <Code or Range>. Throughout this scenario, each code is decided to enter on another step.
3 0
3 years ago
How does the dns help the world wide web scale so that billions of users can access billions of web pages?.
valentina_108 [34]

Answer:

domain name systems allow web users to choose where they want to go and to have many different sites

8 0
2 years ago
SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
VMariaS [17]

Answer:

True

Explanation:

Plz brainlist

5 0
2 years ago
Read 2 more answers
Yall rachits and yall eat butt xD
Trava [24]
Please use this for questions.
6 0
3 years ago
Read 2 more answers
Other questions:
  • In the processes tab of task manager, the ____ tab displays the âworking setâ of a process, or the amount of memory it is active
    12·1 answer
  • When programming in Scratch, to make our Sprite walk across the background, in which category would we find the programming bloc
    7·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • function calculate () { var s = 2; var x = 2; var y = 3; if (x &gt; 4) { s=s+ 2; } else if ( y &gt; 4) { s=s+ 4; } else { s+=3;}
    11·1 answer
  • If you are trying to improve your budget and spending, which option would save you the most money?
    13·2 answers
  • Drag each tile to the correct box.
    11·1 answer
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • Question:
    14·1 answer
  • Write in language C, please.
    8·1 answer
  • The iso 14001:2004 standards require documentation of a firm's environmental program. Which component requires a plan to improve
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!