1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
2 years ago
10

In computer science what are the methods used to protect the information stored by a piece of software called?

Computers and Technology
1 answer:
Nezavi [6.7K]2 years ago
3 0

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

You might be interested in
Develop a command sequence would you use to alter the amount of space between the text in a text box and the text box border?.
yanalaym [24]

The use of the Line and Paragraph Spacing command can  help one to alter the amount of space between the text in a text box and the text box border.

<h3>Which command changes line spacing?</h3>

When one click on Home tab, one should click the Line and Paragraph Spacing command, and when one has select the line spacing that one needs, the selected line spacing will alter in the document.

Note that the use of the Line and Paragraph Spacing command can  help one to alter the amount of space between the text in a text box and the text box border.

Learn more about command sequence from

brainly.com/question/13258375

#SPJ1

8 0
2 years ago
In computer science, what are two names that are used to describe data structures organized by association
Bas_tet [7]

Answer:

Answer to the following question are,

  • Association list
  • Tables

Explanation:

Because these are the two associations data structures.

  • Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.
  • Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.
6 0
3 years ago
In excel, an anchor($) allows you to?
mina [271]
Sssa rinmmy sihoa ihu hji ishoa io>?
6 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
2 years ago
How will you apply the different wiring devices according to its main purposes and functions?
Gekata [30.6K]

Answer:Wiring devices are current-carrying electrical or electronic products that serve primarily as a connection or control point for electrical circuits within a range of 0–400 amperes, 0–600 volts (AC and DC), and AC/DC (660 watts, 1,000 volts AC fluorescent) as well as certain non-current-carrying wiring devices and supplies.

Wiring devices include:

Convenience plugs and power outlets (plugs and receptacles)

Connector bodies and flanged outlets

Cover plates

General-use switches and dimmers

Lampholders (incandescent, fluorescent, cold cathode, neon, quartz lamps, and others)

Lighting control devices

Motion sensing and timer switches

Receptacles

Switch, outlet, FM/TV, blank, and telephone plates

Undercarpet premise wiring systems

Products include receptacle-type arc-fault circuit interrupters (AFCIs), protection devices that can detect an unintended electrical arc and disconnect the power before the arc starts a fire. AFCI technology in residential and commercial buildings is an important electrical safety device.

8 0
3 years ago
Other questions:
  • A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
    13·2 answers
  • Arrange these stages of website design in the order that they follow. developing planning learning designing testing and deliver
    12·1 answer
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
    11·1 answer
  • Write a method called all Less that accepts two arrays of integers and returns true if each element in the first array is less t
    12·1 answer
  • You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance
    15·1 answer
  • Outcomes resulting from using incorect requirement specification during system development​
    11·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • (10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
    13·1 answer
  • ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
    7·1 answer
  • Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!