____________ is the practice of hiding data and keeping it away from unauthorized users.

A. Cryptography

B. Ciphertext

C. Cybersecurity

D. Encryption

Answers

Answer 1

Answer:

D.

Explanation:

Answer 2
A. Cryptography, D is not the correct answer because it is a process not a practice.

Related Questions

D) Use only one .cpp and provide comments inside the code.

Answers

.cpp is a C++ script file extension, so just use a C++ script and add comments in it

A frame is

A. the same as the root window
B. a synonym for a component
C. an invisible component that’s used to group other components
D. the padding around the edge of the root window

Answers

Answer:

D. The padding around the edge of the root window.

Explanation

Teacher emailed me the answer

A frame in computing varies in definition based on context, from individual windows in text editors to organizational components in user interfaces or predefined code structures in web development.

Within the context of computing, a frame can refer to various concepts depending on the specific application or environment discussed. For example, in the Emacs text editor, a frame is an individual window that can contain one or multiple editing buffers, potentially split into smaller windows.

On the other hand, in web development and design, frameworks are akin to a collection of predefined code structures and tools that streamline the development process. In general user interfaces, a frame might be an invisible component used to group other components together for organizational purposes. Each of these uses shares a common theme: a frame is a structural element that either contains, organizes, or supports other items within a system or visual context.

Explain the role auditing plays in the context of achieving trustworthy systems.

Answers

The role of auditing in achieving trustworthy systems include the following:1.Building of checkpoints for security throughout..

In the CSMA/CD random access method, if the maximum propagation time is 100 micro seconds and the station has unsuccessfully attempted transmission ten times, the maximum amount of time the station waits before the next attempt to send is:

a. 51,200 micro seconds

b. 204,800 micro seconds

c. 102,400 micro seconds

d. None of the above

Answers

b. 204,800 Micro seconds

A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).

Answers

Answer:

A geographic information system (GIS) uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).

A function that’s called when a user clicks on a button is commonly known as

A. a click function
B. a callback function
C. a GUI function
D. an event caller

Answers

Answer:

B

Explanation:

A function that’s called when a user clicks on a button is commonly known as a callback function. Thus, option B is correct.

What is a function?

A callback function can be defined that receiving an argument from yet another function and is subsequently called by the individual who may experience to finish a task or activity.

A particular category, which comprises the code for how the done in the right way is invoked, are operations that take other operations as inputs.

A function is a borrowed type since this sort of object it generates determines its type. Modules, ports, listed types, structures, pairs, and some other associated sorts are also included.  Computer gadgets assist computer systems in carrying out these operations. Therefore, option B is the correct option.

Learn more about  callback function, here:

https://brainly.com/question/27961465

#SPJ6

Write a C++ program that prompt the user to enter the coordinate of two points (x1, y1) and (x2,y2), and displays the slope of the line that connects the two points.

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

   float x1,x2;

   float y1,y2;

   float slope;

   cout<<"Enter the value of first point(x1,y1): ";

   cin>>x1>>y1;

   cout<<"\nEnter the value of second point(x2,y2): ";

   cin>>x2>>y2;

   slope = (y2-y1)/(x2-x1);

   cout<<"Slope is: "<<slope<<endl;

}

Explanation:

First include the library 'iostream' for perform the operation of input/output.

after that, write the main function and declare the variable of points.

use the output command 'cout' for display the message on the screen.

use the input command 'cin' for store the value enter by user into the variable.

after that, use the formula to find the slope:

[tex]slope=\frac{(y_{2}-y_{1})}{(x_{2}-x_{1})}[/tex]

Note: All values declare in the code is float type means decimal value. but you can enter integer value as well.

finally, cout is used to display the output slope on the screen.

The 8086 was divided into two main parts. The _____ was the "brain" of the processor, and had the ALU, general-purpose register, control unit, and flags. The __ contained the segment registers, address adder, instruction pre-fetch queue, and handled all the interfacing to memory and I/O.

Answers

Answer:

1.Execution Unit.  2.Bus interface unit

Explanation:

In recent years the number of arbitrary/remote code execution attacks have skyrocketed. Why is this type of attack so popular with attackers?

Answers

Duh... those Hackermans actually have FULL control over the virus.... MUAHAHAHA

The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.

A. business

B. Workstation Domain

C. connectivity

D. infrastructure

Answers

Answer:

the answer is d wish it helps you

write a short C function that takes an integer n and returns the sum of all integers smaller than n.?

Answers

int sumAllNumbersSmallerThanN(int n){

 int sum=0;

 int i;

 for(i=1; i<n; i++){

   sum += i;

 }

 return sum;

}

We simply declared a variable, sum, that will store the result, and set it to zero. Then, we loop all numbers from 1 to n-1, and we sum all these numbers to our sum. When the counter reaches n, the loop stops, and we will have added all numbers from 1 to n-1 in the variable sum.

"int sumofintegers (int n)

{

       int cnt , sum;

       sum = 0;

       for (cnt = 0; cnt<n; cnt++)

       {

               sum = sum + cnt;

       }

return sum;

}

The above function receives the ‘n’ as input and then initialize two variable cnt is used for looping and sum variable to add the numbers which are smaller than the given number.

A for loop is run from 0 to n (not including n since we need to add integers less than n) and then add each value. When the counter reaches n, for loop is exited and the sum is returned to the calling portion.

What is the correct method for moving a control file (assume you use PFILE)?

A. Issue the ALTER DATABASE RENAME FILE command.

B. Shut down the database; move the control file; modify the CONTROL_FILES parameter in PFILE; and start up the database using PFILE.

C. Copy the control file to a new location; shut down the database; modify the CONTROL_FILES parameter; and start up the database.

D. Shut down the database; delete the control file; start up the database in NOMOUNT mode; issue the CREATE CONTROL FILE command; and start up the database.

Answers

Answer:

b

Explanation:

Why is it important for modern companies to control the flow of information to and from their organizations?

Answers

Answer:

If the information just stopped, there wouldn't be able to get anything done. Approvals for construction sites, new product ideas and legal requirement papers wouldn't get through to the right people and the whole company could fail without communication and information.

Explanation:

The control unit takes ths instructions fetched by the preteched unit and translates them into a form that can be understood by

Answers

Memory unit within the CPU

2. A shift register can operate:

a. Serially

b. In parallel

c. Both serially and parallel

Answers

C. Both serially and Perullo

. ___________ is the duty of every government that wants to ensure its national security.

A. Cybersecurity

B. Connectivity

C. Policy

D. Defense

Answers

Answer:

your answer is d wish it helps you

D is the correct answer

What is the difference between an HTTP POST and an HTTP GET? Give an example of when each would be used ?

Answers

Difference:

An HTTP POST request is used to add new information to a server so it can be stored, and an HTTP GET request is used to retrieve stored information from a server.

Usage Examples:

Let's say you run a web server dedicated to storing football game scores.

A computer at a game that just finished may use an HTTP POST request to send the final score to your web server so you can store it.

Someone at home may be viewing a website for sports scores.  That website's server may send an HTTP GET request to your server asking for the final score of a specific game, and your server would provide that information.

Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.

A. digital signals

B. contiguous signals

C. ramp signals

D. exponential signals

Answers

Answer:

i think digital signals

Explanation:

A digital signal is a signal that is being used to represent data as a sequence of discrete values; at any given time it can only take on one of a finite number of values.[1][2][3] This contrasts with an analog signal, which represents continuous values; at any given time it represents a real number within a continuous range of values.

Answer: A) Digital signals

Explanation:

Digital signal is a signal that helps in describing about the data in sequential manner in form discrete bands or binary values. The electrical signal containing data is converted into bits that can be represented through two digital values i.e. 0s and 1s.Other options are incorrect because contiguous signal is regular adjacent signal. Ramp signal is represented as increment in magnitude with timeExponential signal is based on sine and cosine signal that is two real time signal.Thus, the correct option is option(A).

what are the advantages of google cloud ?

Answers

Answer:

There are many advanteges of google cloud but the only one i can name off my head is that there will be ALOT more storage you can use.

Write Python code that prompts the user to enter his or her favorite color and assigns the user’s input to a variable named color.

Answers

Answer:

hope it helps Good luck

Explanation:

color = input("Enter your favorite color: ")

To prompt the user for their favorite color in Python, use the input function and assign the result to the variable 'color'. This demonstrates user input handling and variable assignment, fundamental programming concepts.

To prompt a user to enter their favorite color and assign their input to a variable named color, you can use the following Python code:

color = input('Please enter your favorite color: ')

This line of code uses the input function to display a message to the user, asking them to enter their favorite color. Whatever the user types in response to this prompt is then stored in the variable color.

In programming with Python, entering data through prompts is a common task. This process illustrates how variables can store user input for later use in the program. As you continue to learn Python, you will become familiar with how to differentiate between reserved words and variable names, as modern text editors will often provide visual cues, such as color-coding, to help you differentiate them.

Write a simple Bean to display the current Date and invoke it from the Java Server Page.

Answers

Answer:

Explanation:

In fact, we shall see later that a JSP page is internally translated into a Java servlet. ..... Set the value of a property (variable) of a bean, by invoking its setter. ..... Use a bean with "page" scope to display the current date/time (using Calendar ... Step 2: Write the Tag Handler Class: Create a simple tag handler class called

Function prototypes and function definitions look similar because they have the same function heading. In a function prototype the heading is followed by a ___, whereas in a function definition the heading is followed by a ___.

Answers

Answer:

In a function prototype the heading is followed by a semicolon, whereas in a function definition the heading is followed by a function block.

Explanation:

As the function prototype only declares the function and the function definition defines the operations in the function.

e.g:

add(int x, int y);  is the prototype

add(int x, int y)

{

     int sum;

     sum [tex]=[/tex] x[tex]+[/tex]y;

}    is the function definition.

The internet backbone is a foundation network linked with

Answers

Answer:

it is linked with the fiber optic cables in order to support very high bandwidth (connecting government agencies, schools, commercial, or high-capacity routers)

Explanation:

The thick net medium consisted of a thin coaxial cable True/False

Answers

Answer:

True

Explanation:

The thick net medium consisted of a thin coaxial cable.

What do you believe is the future of certification?

Answers

Technology,performance,learning

what is the subnet mask ?

Answers

Answer:

is a 32-bit number that masks an IP address

Explanation:

A Subnet Mask is used to divide the IP address into network and host addresses

When date is processed into a meaningful form, i becomes _______.

Answers

Answer:

When date is processed into a meaningful form, it becomes information.

What is process and what do you know about process control block?

Answers

hello! mark me brainliest please

Process Control Block is a data structure that contains information of the process related to it. The process control block is also known as a task control block, entry of the process table, etc. ... It also defines the current state of the operating system.

What is the leading use of computers

Answers

Answer:

email, texting and social networking

Answer:

The Leading use of computers are discussed below.

Explanation:

Computers are also used in:

Manufacturers of all dimensions and in all business segmentsIncluding production large-scale RetailAssistanceExcavatingAgricultureTransportationAnd Communications.

The most well-known enterprise uses of a computer system are database administration, commercial administration and accounting, and word processing.

A rear drum brake is being inspected. The primary shoe is not contacting the anchor pin at the top. Technician A says that this is normal. Technician B says that the parking brake cable may be adjusted too tight or is stuck. Which technician is​ correct?

Answers

The answer is B :).

Answer:

yep it's B

Explanation:

Other Questions
2What is considered the highest form of artistic expression in the Islamic culture? Based on the selection, which word best describes Uchidas mother? (-5+1)(((3+6)*2-2)(5)-1) evaluate. The study and manipulation of DNA on a molecular level is known asa. biochemistry.b. molecular genetics.c. evolution.d. genomes. What is the quotient of 3,968 32? Which is the simplified form of the expression? When projecting future cash flows of an investment ________. A. the initial investment is a significant cash outflow that is treated separately from all other cash flows B. cash flows include depreciation C. cash inflows and outflows are treated separately, rather than being netted together D. cash flows are projected by accounting personnel without considering input from other departments "[T]he spirit of party ... opens the door to foreign influence and corruption, which finds a facilitated access to the government itself through the channels of party passions. Thus the policy and the will of one country are subjected to the policy and will of another." George Washington, from Farewell Address, 1796 What important idea does George Washington want Americans to recognize, as described in this excerpt? (5 points) Factions divide a country so as to invite involvement from other countries that have their own agendas. Creating an alliance with a foreign country is a commitment that never ends and can destroy the nation. Creating an alliance with a foreign country or people helps secure one's own sovereignty and peace. Factions are essential to the healthy development of liberty and republicanism and should be encouraged. Unlike her husband, a peasant woman worked Consider the classification levels of a human. Eukarya ,Animalia ,Chordata ,Mammalia ,Primates, Hominidae ,Homo ,sapiens .Which is the most specific taxonomic level in the classification system above?A sapiensB HomoC HominidaeD Primates In what way did the Christian crusades contribute to the decline of the byzantine empire?a.) financing the crusades prove to be an impossible burden for the Byzantine treasuryb.) latin Crusaders turned against the Byzantines, leading to the loss of much territoryc.) the Byzantine army lost many of its leading knights when they left to fight in the crusadesd.) nations that were not joining the crusades attacked byzantium when it was occupied in the east Last year Jack Company had a net income of $270,000, income tax of $50,000, and an interest expense of $20,000. The company's times interest earned was closest to:A. 17.00B. 10.00C. 13.50D. 14.50 Which equation can be used to represent three minus the difference of a number and one equals one-half of the difference of three times the same number and four? what occupation did muhammad have before the first revelation y = x^2+ 7x - 5 can be written in the form y = (x + a)^2+bFind the value of a and the value of b Read these lines from Yusef Komunyakaa's poem "Facing It":A white vet's image floatsclose to me, then his pale eyeslook through mine. I'm a window.He's lost his right arminside the stone. In the black mirrora woman's trying to erase names:No, she's brushing a boy's hair.Vhich statement best interprets the author's use of metaphor in these lines?OA. The metaphor of the window shows that the speaker is trying toescape the bad choices he made in the past.OB. The metaphor of the wall shows that people from all walks of lifeare brought together in mourning.Oc. The metaphor of the window shows that the speaker isempathetic to the pain of other Vietnam veterans.OD. The metaphor of the wall shows that the speaker understands thepain and torment of other Vietnam veterans, What can readers learn from the story of Keesh by Jack London 1 -For what value of x is line a parallel to line b 2-For what value of x is line a parallel to line b 20 POINTS!!! PLEASE HELP!!!! ASAP!!!!!1A metal has higher reactivity than magnesium. Which of the following statements about the location of this metal on the periodic table can be true? A. The metal is to the right of magnesium in the same row. B. The metal is to the left of magnesium in the same row. C. The metal is below magnesium in the same column. D. The metal is above magnesium in the same column. PLZ HURRY IT'S URGENT!Which was NOT one of the Enlightenment ideas that promoted revolution in France?A.No one should pay taxes.B.People have natural rights.C.Rights should be written in a constitution.D.Government should represent the people.