answersLogoWhite

0

use a password dont read any spam from emails

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

How do you protect files from modification?

you cant obviously


How do you protect a computer from modification?

Answer: Chick tika masala.


How can you explain how to protect files from unauthorised access or modification?

you ask jesus


What term relates to an ability to protect against the unauthorized modification or destruction of information?

confidentiality


What happens if you don't protect your files from unauthorised access or modification?

People can get access or modify your files.


Why do you protect files from modification?

So other people cannot delete your work and change whats on your computer.


What is values modification?

values modification


New generations are better suited to the environment than the first generation what is this called?

Descent with modification (Apex)


What is an example of a market modification?

market modification can be done by product modification, i.e the promotion of SUNSILK has increased the market share by including a bit modification in their product and adding a factor of dermotologist. actually market modification is the modification in market share.


What is order modification?

A modification of the court order.


Which term refers to a secure systems ability to protect against the unauthorized modification?

The term that refers to a secure system's ability to protect against unauthorized modification is "data integrity." Data integrity ensures that information is accurate, consistent, and trustworthy over its lifecycle, preventing unauthorized changes or corruption. This is achieved through various security measures, including access controls, encryption, and regular audits.


Is pea tendril a stem modification?

no, it is a leave modification