Which security related phrase relates to the integrity of data?

Answers

Answer 1

Answer:

Explanation:

Data integrity.


Related Questions

You have searched a database to locate US cities with population counts above 1 million people. You need to present the results to the class. Which of these describes the process you should use to accomplish these tasks?

options

enter data into a form and present it to the class

present the table you used to search for cities with more than 1 million people

run a query and create a report from the datasheet

run a query and present the datasheet to the class

Answers

Answer:

Run a query and create a report from the datasheet.

Explanation: creating a report will give a easy to understand explanation of all the data you have collected.

Answer:

the answer is C

the next one is B

Explanation:

What are the 3 biggest advancements in computers?

Answers

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

In a student scheduling program, a variable HasFreePeriod is set as True or False. This variable is an example of?
an abstract data type.
a user defined type.
an array.
a scalar

Answers

Answer: a user defined type

Explanation:

Answer:

Hi

Explanation:

The answer would be A User Defined Type

The one who answered before me is right as well

If AX contains hex information 2111 and BX contains hex information 4333, what is the content in BX in hex format after performing ASM instruction ADD BX, AX

Answers

Answer:

BX will hold 6444 in hex format.

Explanation:

From the given information:

We need to understand that AX is 64-bit hex number.

When performing ASM instruction (Assembly language instruction),

The addition of 2111 + 4333 = 6444 will be in BX.

This is because ADD, BX, AX will add bx and ax; and the final outcome will be stored in BX.

BX will hold 6444 in hex format.

can a 3048 hp motherboard support a i7 10700k cpu?

Answers

Answer:

Yes

Explanation:

Answer:

yes it can

Explanation:

no need to explain

The NeedsMet rating is based on both the query and the result

Answers

It is TRUE to state that the NeedsMet rating is based on both the query and the result.

How is this so?

The grade of Needs Met is based on both the question and the response. When awarding a Needs Met rating, you must carefully consider the query and user intent. The Page Quality rating slider is unaffected by the query. When providing a Page Quality rating to the LP, do not consider the query.

The Needs Met measure considers all aspects of "helpfulness," and many users consider low Page Quality results to be less useful than high Page Quality results. This should be reflected in your ratings. The HM [highly meets] grade should be assigned to sites that are useful, have high Page Quality, and are a good match for the query.

Learn more about query at:

https://brainly.com/question/25694408

#SPJ1

6.1.5: Function definition: Volume of a pyramid.


Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Sample output with inputs: 4.5 2.1 3.0
Volume for 4.5, 2.1, 3.0 is: 9.45
Relevant geometry equations:
Volume = base area x height x 1/3
Base area = base length x base width.

Answers

Answer:

def calc_pyramid_volume(base_length, base_width, pyramid_height):

   return (base_length*base_width*pyramid_height*1/3)

The code given below is in Java as it calculates the volume of the pyramid by creating the function. The base length as well as the base width, and the pyramid height has been passed as the parameters to the function.

The function of calc_pyramid_volume with parameters base_length.

//Main.java

public class Main

{

public static void main(String[] args) {

//Initialize the variables

double base_length = 4.5;

double base_width = 2.1;

double pyramid_height = 3.0;

//Call the the function with the given parameters

System.out.printf("Volume for %.1f, %.1f, %.1f is: %.2f", base_length, base_width, pyramid_height

, pyramid_volume(base_length, base_width, pyramid_height));}

Therefore,

//function that takes length, width and height as parameters and returns the volume

public static double pyramid_volume(double base_length, double base_width, double pyramid_height) {

//calculate the base area by multiplying the base length and base width

double base_area = base_length * base_width;

Learn more about pyramid on:

https://brainly.com/question/13057463

#SPJ2

a user's windows based workstation is locking up frequently. it seems as though the lock ups occur when memory usage hits a certain point. you suspect one of the workstation's memory sticks is bad. which of the following will help you troubleshoot and verify that memory is bad?

Answers

A: 'Windows Memory Diagnostics' will help you troubleshoot and verify that memory is bad.

The Windows Memory Diagnostic tool is a very useful utility tool for troubleshooting when the computer begins running slowly,  hangs, freezes, displays a blue screen, locks up, or reboots on its own, and can help you to detect issues with applications and software installed on the computer, whether caused by memory errors or not.

According to the scenario when a Windows-based workstation of a user is frequently locking up. It seems like frequent lock-ups occur when memory usage reaches a certain point. It is suspected by you that one of the memory sticks of the workstation is bad. In order to troubleshoot and verify that memory is bad the 'Windows Memory Diagnostics' tool will help you.

"

Complete question:

a user's windows based workstation is locking up frequently. it seems as though the lock ups occur when memory usage hits a certain point. you suspect one of the workstation's memory sticks is bad. which of the following will help you troubleshoot and verify that memory is bad?

a. Windows Memory Diagnostics

b. System Administrating Tool

c. Ctrl + Alt + Del

d. None of them

"

You can learn more about Windows Memory Diagnostics at

https://brainly.com/question/27807893

#SPJ4

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioned

item includes an ID number, item description, length of auction in days, and minimum required bid.

Design a flowchart or pseudocode for the following:

-a. A program that accepts data for one auctioned item. Display data for an auction only if the

minimum required bid is more than $250.00

Answers

The pseudocode for the program: Announce factors for the unloaded thing information, counting:

auction_id (numbers)

item_description (string)

auction_length (numbers)

minimum_bid (drift)

Incite the client to enter the auction_id, item_description, auction_length, and minimum_bid.

What is the pseudocode?

The program acknowledges information for one sold thing, counting the auction_id, item_description, auction_length, and minimum_bid. It at that point checks in case the minimum_bid for the unloaded thing is more prominent than or rise to to $250.00.

The pseudocode for the program pronounces factors for the sold thing information and prompts the client to enter the information. At that point it employments an in the event that articulation to check in case the minimum_bid is more noteworthy than or break even with to 250.00.

Learn more about pseudocode  from

https://brainly.com/question/24953880

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioneditem

Which of the following would be considered good practice for cleaning up large pieces of contaminated glass in a laboratory biohazard spill?
O Wear gloves, a lab coat, and face protection; use a dust pan and tongsO Needle boxes or sharps containers must be located in the immediate vicinity of use and never be allowed to overfill.O be recapped by hand and must be discarded directly into a sharps container or needle box located in the immediate work area.O Reusable sharps must be placed in a labeled, rigid container containing disinfectant or in a rigid container for reprocessing to protect handlers until they are decontaminated.

Answers

Will be using a dust pan and tongs, which are regarded good practice when cleaning up sizable bits of contaminated glassware in a lab biohazard spill, together with gloves, a lab coat, & face protection.

What is biohazard?

Biological compounds that jeopardize the well-being of living things, particularly humans, are referred to as biohazards, sometimes known as biological hazards. Medical trash or samples of microorganisms, viruses, other poisons which can be harmful to human health are examples of this.

What are the types of biohazard?

Biological dangers can come from a variety of sources, including bacteria, viruses, bugs, plants, birds, mammals, and people. These sources have the potential to have a wide range of negative health effects, from allergies and skin rashes to infections (such as AIDS, TB, and cancer), as well as other diseases.

To know more about biohazard visit:

brainly.com/question/30327296

#SPJ1

apples and bananas apples and bananas

Answers

Answer:

bananas and apples bananas and apples?

Explanation:

Answer:

these are good for me

Explanation:

yeye

What is one of the benefits of using a library in a program?

Answers

Answer:

Simplifies creating a complex program

Explanation:

The benefits that can be associated to the use of library in a program is Reduction in the size of class files which brings about simplicity in creating a complex program.

Using a library in a program usually helps to simplify the work, the code can be extracted and move to a place so that the bulkiness will not disturb the work.

This makes the program faster and easy, and simple.

Therefore using library brings simplicity.

Learn more at:

https://brainly.com/question/5068505?referrer=searchResults

Most operating system have GUI as part of the system, which is the following best describes an operating system GUI

Answers

A Graphical User Interface (GUI) is the component of an operating system that allows users to communicate with the system using graphical elements. GUIs are generally used to give end-users an efficient and intuitive way to interact with a computer.

They provide an easy-to-use interface that allows users to manipulate various objects on the screen with the use of a mouse, keyboard, or other input device.The primary function of an operating system GUI is to make it easier for users to interact with the system.

This is done by providing visual feedback and a simple way to access various system functions. GUIs can be customized to suit the user's preferences, which means that they can be tailored to meet the specific needs of different users.Some of the key features of a GUI include the use of windows, icons, menus, and buttons.

Windows are used to display information and applications, while icons are used to represent various objects or applications on the screen. Menus and buttons are used to provide users with a way to access various system functions, such as saving a file or printing a document.

The use of a GUI has become a standard feature of most operating systems. This is because GUIs make it easier for users to interact with computers, and they provide an efficient and intuitive way to access various system functions.

For more such questions on Graphical User Interface, click on:

https://brainly.com/question/28901718

#SPJ8

As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return the following (in order):
1. The entire data frame
2. Total number of rows
3. Total number of columns
def load_data():
# YOUR CODE HERE
df, num_rows, num_cols

Answers

Answer:

import pandas as pd

def load_data():

df = pd.read_csv("airline-safety.csv')

num_rows = df.shape[0]

num_cols = df.shape[1]

return df, num_rows, num_cols

Explanation:

Using the pandas python package.

We import the package using the import keyword as pd and we call the pandas methods using the dot(.) notation

pd.read_csv reads the csv data into df variable.

To access the shape of the data which is returned as an array in the format[number of rows, number of columns]

That is ; a data frame with a shape value of [10, 10] has 10 rows and 10 columns.

To access the value of arrays we use square brackets. With values starting with an index of 0 and so on.

The row value is assigned to the variable num_rows and column value assigned to num_cols

In what ways can you modify the location of the neutral point?
o Change the size of the wing.
o Change the size of the horizontal stabilizer
Change the position of the wing.
All of the above.

Answers

Change the position of the wing. That would change it

how to put page number in word?

Answers

Answer:

-->  Insert > Page Number, and then choose the location and style you want.

--> If you don't want a page number to appear on the first page, select Different First Page.

--> If you want numbering to start with 1 on the second page, go to Page Number > Format Page Numbers, and set Start at to 0.

--> When you're done, select Close Header and Footer or press Esc.

survey and describe the system

Answers

Survey systems help create, distribute, and analyze surveys by providing a framework for designing questionnaires, managing respondents, and analyzing data.

What is survey?

A survey system lets users create surveys with different question types and response options. The system offers multiple ways to distribute surveys, including sharing a web link, email invites, website embedding, and social media.

Data is collected from respondents and stored accurately and securely, with error checking and validation in place. After survey completion, analyze data with summary stats, visualizations, filters, and cross-tabulations for identifying patterns. Survey systems have reporting features to generate detailed reports based on its data, including statistics, graphs, etc.

Learn more about survey  from

https://brainly.com/question/14610641

#SPJ1

working with the tkinter(python) library



make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?

Answers

To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.

How can I make a tkinter window always appear on top of other windows?

By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.

This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.

Read more about python

brainly.com/question/26497128

#SPJ1

I have no clue how to find my recently viewed imaged on my windows 10. Please help!

Answers

To find your recently viewed images on a Windows 10 computer, follow these steps:

Open the File Explorer by clicking the folder icon on your taskbar or by pressing the Windows key + E on your keyboard.

Click on the "Pictures" folder in the left pane to view your images.

To see your recently viewed images, click on the "Recent" folder in the left pane.

To view images from a specific folder, click on the folder's name in the left pane.

If you cannot find the images you are looking for, you can use the search function to find them. To do this, click on the search box at the top of the File Explorer window and enter a keyword or phrase related to the image you are looking for.

I hope this helps! Let me know if you have any other questions or need further assistance.

Write code that outputs variable numTickets. End with a new line (Java) output 2 and 5

Answers

Answer:

public class Main {

public static void main(String[] args) {

int numTickets = 2;

System.out.println(numTickets);

numTickets = 5;

System.out.println(numTickets);

}

}

Which is a graphical tool used to represent task duration but not sequence?
A. CPM
B. Network Diagram
C. Pert
D. Gantt

Answers

CPM is a graphical tool used to represent task duration but not sequence.

What is the CPM used for?

The critical path method (CPM) is known to be a method  where a person identify tasks that that are essential for project completion and know its scheduling flexibilities.

Therefore, CPM is a graphical tool used to represent task duration but not sequence.

Learn more about graphical tool from

https://brainly.com/question/12980786

#SPJ1

At your bank, you notice that the bank has installed a new ATM with a touch screen. When you insert your bank card to begin the transaction, the ATM asks for your personal identification number (PIN). When you attempt to enter your PIN using the touch screen, you find that the ATM is not recognizing your input. What are your next steps?

Answers

Your next steps should include:

Calling the automated teller machine (ATM) service call center to inform them that the new touch screen installed cannot recognize your finger. Request to know if anything is wrong with your bank card.Ask if the automated teller machine (ATM) is updated.

What is a bank card?

A bank card can be defined as a small rectangular-shaped plastic card that is issued by a financial institution (banks) to its customers, which allows them to purchase goods and services on credit, especially based on the agreement that the amount of money taken would be paid later with an agreed upon interest rate.

What is a PIN?

PIN is an abbreviation for personal identification number and it can be defined as a four-digit number that is designed and developed to distinguish an unauthorized user from an authorized user.

In this scenario, your next steps should include the following:

Calling the automated teller machine (ATM) service call center to inform them that the new touch screen installed cannot recognize your finger. Request to know if anything is wrong with your bank card.Ask if the automated teller machine (ATM) is updated.

Read more on personal identification number here: https://brainly.com/question/14596190

#SPJ1

this has nothing to do with computers but its for brainly. if somebody is an expert in brainly im not sure. but why do my questions keep getting deleted? my question “does not follow guidelines” but im just trying to ask a math question

Answers

Answer:

Maybe its a word or the subject you are talking about. If its a exam or ohio state test they might delete you're question.

How to write a java program that asks the user for grades of students. Once the user enters 0 (zero), the program should print the largest of the marks of the students.

Answers

Answer:

import java.util.Scanner;

public class GradeProgram {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       System.out.println("Please enter the student grades: ");

       int grade = sc.nextInt();

       int largestGrade = 0;

       while (grade != 0) {

           if (grade > largestGrade) {

               largestGrade = grade;

           }

           grade = sc.nextInt();

       }

       System.out.println("The largest grade is: " + largestGrade);

   }

}

Explanation:

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

A network technician is implementing a software-defined network. Which of the following layers would apply business logic to make decisions about how traffic should be prioritized?
A. Application
B. Management
C. Infrastructure
D. Access

Answers

The correct option is A. Application. In a software-defined network (SDN), the application layer is responsible for controlling and managing the network's behavior.

This layer includes the software applications that run on top of the SDN and determine how traffic should be prioritized based on business logic.

By leveraging centralized controllers and software applications, SDNs can automate network management and provide granular control over network traffic. This allows businesses to prioritize mission-critical applications and services while optimizing network performance and reducing costs.

Overall, the application layer plays a critical role in the implementation of SDNs by enabling intelligent decision-making and network optimization based on the unique needs and requirements of the business.

To know more about SDN click here:

brainly.com/question/29386698

#SPJ4

Show that 4n3 + 10n – 20 is O(n3).

Answers

4n3 + 10n – 20 = O(n3), since 4n3 is the highest order term.

Proof that the function is an  O(n3) function in Big O notation

Let f(n) = 4n3 + 10n – 20

f(n) can be rewritten as:

f(n) = 4n3 + 10n – 20

f(n) ≤ c·n3

where c is a constant

For any n ≥ 1

f(n) ≤ 4n3 ≤ c·n3

Let c = 4

f(n) ≤ 4·n3

Therefore, f(n) = O(n3).

Big O notation is a way to describe the complexity of an algorithm. It expresses the upper bound of a function's growth rate, which measures the amount of resources (such as time or memory) an algorithm requires as the input size increases. Big O notation is used to express the worst-case and average-case time complexity of an algorithm.

Learn more about big O notation here:

https://brainly.com/question/15234675

#SPJ1

Type the correct answer in the box. Spell all words correctly.
Jason needs to learn a new web tool. He went through his books to understand more about it. Now he wants hands-on experience with using that tool
What would help him?
Jason can use BLANK
websites where workspace is provided to test the results of your code

Answers

Answer:

Jason can use online websites where workspace is provided to test the results of his code.

Explanation:

While setting up annetwork segment you want to check the functionality cable before putting connectors on them. You also want to meaure the termination point or damange in cable which tool used

Answers

A network is divided into several parts (subnets) using network segmentation, which creates smaller, independent networks for each segment.

What is network Segementation?

Segmentation works by regulating the network's traffic flow. The term "network segmentation" should not be confused with "microsegmentation," which limits east-west communication at the workload level in order to lower an organization's network attack surface.

Despite having some uses, microsegmentation should not be confused with standard network segmentation.

A network is divided into several zones via network segmentation, and each zone or segment is independently managed. To regulate what traffic is allowed to pass through the segment and what is not, traffic protocols must be used.

Dedicated hardware is used to create network segments that are walled off from one another and only permit users with the proper credentials to access the system.

Therefore, A network is divided into several parts (subnets) using network segmentation, which creates smaller, independent networks for each segment.

To learn more about network, refer to the link:

https://brainly.com/question/15088389

#SPJ1

What is the HIPAA privacy rule, and why does it affect IT professionals.

Answers

It protects a persons identifiable health information and medical records.
Other Questions
sanitary landfills are commonly used in the united states to manage solid waste. since decomposition in sanitary landfills relies upon anaerobic bacteria (those that live in oxygen-poor environments), a large amount of is produced.A. methaneB. carbon dioxideC. oxygenD. nitrogenE. sulfur Kent hates to wear ties but wears one to his sister's wedding to avoid his family's disapproval. Kent's behavior exemplifies the importance of the length of a rectangle is 3 less than twice the width. The perimeter is 108 in. What is the length and width? calculate the gauge pressures inside 2.00-cm-radius bubbles of water, alcohol, and soapy water. which liquid forms the most stable bubbles, neglecting any effects of evaporation? 1. He cuts his hair and bleaches it to avoid being identified. He tells the story. * 1 point 2.) This is the Spy for the Greasers. * 1 point 3.) This guy is always cracking Jokes and getting his two cents in. * 1 point 4.) This character is the pet of the greaser gang. * 1 point 5.) Ponyboy runs away after this character hits him * 1 point 6.) He is the wild one of the group but has a soft spot for Johnny. * 1 point 7.) He ends up getting killed in the park by a switchblade. * 1 point 8.) This is the greaser known for his looks and rodeo skills. * 1 point 9.) What does Cherry say is the main difference between Greasers and Socs? * 1 point a. Greasers feel too violently and Socs dont feel anything b. Greasers dont have money and Socs do c. Greasers are mean and Socs are nice d. Greasers deserve what they get and Socs never get in trouble 10.) What are the Greasers two rules? * 1 point a. Fight with weapons, dont get caught b. Dont get caught, back up your buddies c. Back up your buddies, steal what you can d. Hustle, Loyalty, Respect 11.) What is the Main Conflict in The Outsiders? * 1 point a. Johnny killing a Soc b. Cherry Valance working with the Greasers c. The Socs and Greasers hate each other and that is leading to confrontations. d. The Greasers keep getting jumped by the Socs. 12.) What event below was foreshadowed in The Outsiders? * 1 point a. Ponyboy and Johnny getting jumped b. The fire at the church c. Ponyboy getting sick from cigarettes d. All of the above 13.) What did Johnny notice about Bob that scared him? * 1 point a. He was a Soc b. He was wearing rings c. He had a knife d. He had a gun 14.) Why does Johnny want to turn himself in? * 1 point a. So Ponyboy does not get into trouble b. Cherry Valence said she would testify that it was self defense c. He thought he had a good chance of getting off easy d. All of the above 15.) What does Ponyboy realize Darry is really afraid of at the hospital? * 1 point a. Nothing b. Ponyboy hating him c. Pony and Soda leaving him d. Ponyboy running away there have been 2 earthquakes in the magnitude range 6.0-7.0 in the san francisco area over the past 30 years. what is the mean recurrence interval of earthquakes in this magnitude range? what is the Haitian food pikliz. like what is it made of I need a brief summary if abc is more accurate, why would a manufacturing company implement traditional costing over activity based costing? During the agricultural revolution, the enclosure movement caused many former serfs to move to cities in search of work, which led to? 5x5 18 what is x ? please help thank youu HELP ME. PLEASE :(((( Representatives in the House of Representatives is chosen by what? pcr is a chain reaction because the targeted dna is repeatedly replicated as long as the process continues. with every replication cycle, the amount of dna is . duck PLEASE HELP ME THIS IS URGENT I WILL GIVE BRAINLIEST HELP HELP HELP PLEASE Coursesurse HomeOn an architect's blueprint, 1 inch corresponds to 4 feet. Find the length of a wall represented by a line 2inches long on the blueprint.ssignmentsThe length of the wall isft. a page of ........ book is torn.( a,an,the, nothing) Primary motor neurons of the __________ motor pathway originate in the primary motor cortex, whereas primary motor neurons of the __________ motor pathway originate in the brainstemdirect, indirect A bug on the outside of a wheel rotates at a constant angular rate. You measure the bug to pass through 57 radians in 6.80 seconds. If the wheel's radius is 0.35 meters in length, what is the linear tangential velocity of the rock? Give your answer in units ofmeters per second.