Mechanisms are used to protect data from indirect detections


Asked by admin @ in Computer Science viewed by 563 People


Which of the following is a mechanism of providing protection to data and methods of a program?​

Answered by admin @



Answer:

encapsulation

Explanation:

by means of encapsulation we can protect data and methods by taking them together and making visibility private


Similar Questions

Differentiate between direct and indirect use value of biodiversity

Asked by admin @ in Biology viewed by 386 persons

Differentiate between direct and indirect use value of biodiversity with suitable examples in about 120 words.

How does use of fuse wire protect electrical appliances

Asked by admin @ in Physics viewed by 314 persons

6. How does use of fuse wire protect electrical appliances?

A machine used for converting mechanical energy into electrical energy

Asked by admin @ in English viewed by 352 persons

A _____ (OMANYD) is a machine used for converting mechanical energy into electrical energy.

Write an argument for or against the idea of using controlled fires to protect wild areas.

Asked by maham237 @ in English viewed by 594 persons

Write an argument for or against the idea of using controlled fires to protect wild areas . rough draft and final draft need helppp !!

Which component of the personality uses defense mechanisms and why

Asked by admin @ in Social Studies viewed by 315 persons

Which component of the personality uses defense mechanisms, and why? the id uses defense mechanisms to express its impulses. the superego uses defense mechanisms to help the id express its …

Which device is used to backup the data

Asked by admin @ in Computer Science viewed by 326 persons

Which device is used to back up data? *

What is the benefit of using digital data

Asked by admin @ in English viewed by 401 persons

What is the benefit of using digital data? A It can help you make informed decisions and improve online performance B Digital data is always 100% accurate C Digital data …

How many bits are used in the data bus

Asked by admin @ in Computer Science viewed by 360 persons

How many bits are used in the data bus in 8085 microprocessor?

Any data or instructions that are used by a computer

Asked by admin @ in Computer Science viewed by 328 persons

What is a data or an instruction entered into the computer.

The most important safety method used for protecting home appliances

Asked by admin @ in Physics viewed by 301 persons

11. Assertion : The most important safety method used for protecting home appliances from short- circuiting or overloading is the use of fuse Reason : The fuse in the circuit …

Which technology can be used to protect voip against eavesdropping

Asked by admin @ in Computer Science viewed by 356 persons

Which technology can be used to protect voip against eavesdropping??

The software to protect your computer from data loss is

Asked by admin @ in Computer Science viewed by 309 persons

How does antivirus and antispyware program protect the computer from data loss​

Are variables that store data for direct or indirect processing

Asked by maham237 @ in Business viewed by 297 persons

Computers are typically protected from viruses by the use of

Asked by maham237 @ in Computers And Technology viewed by 357 persons

Computers are typically protected from viruses by the use of a. attachments. b. passwords. c. hardware. d. firewalls.

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19024 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15811 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10973 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10403 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8722 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8136 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7842 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6487 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5790 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5693 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5476 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4981 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4971 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4684 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4488 persons