answersLogoWhite

0

Describe methods in securing data

Updated: 11/22/2022
User Avatar

Wiki User

13y ago

Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Describe methods in securing data
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Methods of securing heavy cargoes such as locomotives?

non-sense


Which three protocols describe methods that can be used to secure user data for transmission across the internet?

*ipsec*ssl*https


What are the methods in collect data?

There are five different methods in collecting data. The methods in data collect are registration, questionnaires, interviews, direct observations, and reporting.


What are bondage techniques?

Methods for securing someone or something to restrict or prevent movement or escape.


How Do You describe the shape of a data set?

You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.


What process is involved in in all methods of testing hypotheses?

Data Collection is involved in all methods of testing hypotheses.


When speaking of passwords and authenticators?

Passwords are strings of characters used to authenticate users' identities. Authenticators are devices or methods used to confirm the identity of a user seeking access. Both are essential for securing accounts and data from unauthorized access.


What is used to describe data and what is used to display data in computer?

what is used to describe data and what is used to display data in compuier


What are the methods of presenting data?

two methods of presenting data 1.tabular form 2.pictorial form


List and describe three methods of nonpoint and pollution control?

list and describe three methods of nonpoint pollution control


Describe what methods you would use to convert a browser to a customer?

* Describe what methods you would use to convert a browser to a customer


Describe the area of structured types in an object oriented database and give an example of their use?

Data is stored as objects and can be interpreted only using the methods specified by its class.