Security controls are measures that are put in place to control or prevent the attack of a threat on a system. The three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files are;
Physical ControlsTechnical ControlsAdministrative ControlsPhysical controls refer to the measures that are put in place so that unauthorized access to sensitive files is warded off.
It could imply Installing cameras and fingerprinting to prevent such access.
Technical controls are installed to protect the hardware and software. Systems might need to be configured and programmed in such a way that can resist any attack from threats.
Antivirus and data encryption are types of technical controls.
Administrative controls are installed through the policies and standards of operations of the organization.
Through training, new employees are educated on ways to protect the systems from attack.
Learn more here:
https://brainly.com/question/24674099
please help me social media marketing
What is white light?
White light is when green, blue, indigo, and violet are reflected.
White light is when all colors are absorbed.
White light is when red, orange, and yellow are absorbed.
White light is when all colors are reflected.
Answer:
White light is when all colors are reflected.
thank you
How do you indicate a new paragraph?
<img>content</img>
<em>content</em>
<a>content</a>
<p>content</p>
Answer:
i think it says it here https://www.peachpit.com/articles/article.aspx?p=674695&seqNum=6
Explanation:
content
A machine learning model is used to tell if an object is an apple or not. It uses 10 pictures of apples and keeps on getting it wrong. Look at the graph below. How can you make the model better?
Answer:
Add more pictures of apples to the model.
Explanation:
help me pls...
Which of the following can a cell contain?
A: a number
B: a word
C: a function
D: all of these
Answer:
None
Explanation:
A cell is a living thing it contains a plasma membrane, an outer covering that separates the cell’s interior from its surrounding environment; cytoplasm, consisting of a jelly-like region within the cell in which other cellular components are found; DNA, the genetic material of the cell; and ribosomes, particles that synthesize proteins
Answer:
D, all of the above :)
name the steps to turn on a computer properly
Answer:
Check that the computer is connected to power, and is powered on.
Make sure that your keyboard and mouse are plugged in.
Check that the monitor (screen) is plugged into the computer using its display cable.
Ensure that the monitor is connected to power and is turned on.
Explanation:
¿por que hay peligros en internet?
Answer:
Wait
it eases off.
Get home,
gathered,
very close and look up –
we find it’s all right.
Play:
they be.
For life,
but all vanished
picture faces –
matter: I do or don’t.
More,
something
out of hold
squeeze it tightly
my best,
my best life.
Opened,
something –
back at that moment –
all marchers
the room, the door, the front
rang through the outside
Explanation:
What is the meaning of s used in 0 and 1 in computer .
Answer:
A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.
Explanation:
hope this helps!!
True or False: A sequential search of a list assumes that the list elements are sorted in ascending order.
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming that n/2 is divisible by b
Answer:
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming
i don t know
Creation of network is known as…?
Answer:
GRIDExplanation:
HOPE IT HELP ✌️✌️✌️✌️
Answer:
It’s knows as grid
Explanation:
creation of network is known as grid
(Hope this helps can I pls have brainlist (crown)☺️)
Prior to the invention of the WIMP interface, users often interacted with systems through _____ interfaces. Group of answer choices Audio Touch Command-based GUI
Answer:
comment Line Interface
(the command-based option)
Explanation:
Not an expert so the answer might be wrong
Prior to the invention of the WIMP interface, users often interacted with systems through command-line interfaces. Thus, the correct option is C.
What is Command Line Interface?A command-line interpreter or command-line processor is the device and expert who uses a command-line interface to receive all the commands from a user in the form of lines of texts. This command provides a means of setting parameters for the environment, including invoking of the executables and providing information to them as to what actions they are required to perform.
User interfaces are the commands which may be of three types including command line interface, graphic user interface, and menu-driven interface. Programmers, experienced computer users, or administrators are the people who may utilize a command line interface.
Therefore, the correct option is C.
Learn more about Command-line interface here:
https://brainly.com/question/15704118
#SPJ2
Write a program that reads integers userNum and divNum as input, and output the quotient (userNum divided by divNum). Use a try block to perform the statements. Use a catch block to catch any ArithmeticException and output an exception message with the getMessage() method. Use another catch block to catch any InputMismatchException and output an exception message with the toString() method. Note: ArithmeticException is thrown when a division by zero happens. InputMismatchException is thrown when a user enters a value of different data type than what is defined in the program. Do not include code to throw any exception in the program.
The program is an illustration of exceptions
Exceptions are used to manage programs from crashing, when they encounter errors.
The program in Java, where comments are used to explain each line is as follows:
import java.util.*;
public class Main {
public static void main(String[] args) {
//This creates a Scanner object
Scanner input = new Scanner(System.in);
//This gets input for userNum
int userNum = input.nextInt();
//This gets input for divNum
int divNum = input.nextInt();
//This opens the InputMismatchException try catch
try {
//This opens the ArithmeticException try catch
try{
//This prints the division of userNum by divNum
System.out.print(userNum/divNum);
}
//If divNum is 0, this catches the exception
catch (ArithmeticException e){
System.out.println(e.getMessage());
}
}
//If the inputs are not integers, this catches the exception
catch (InputMismatchException ex) {
System.out.println(ex.getMessage());
}
}
}
Read more about exceptions at:
https://brainly.com/question/6864640
please help me asapppppp
Answer:
lol no
Explanation:
Based on this, which component would Mr. O be most concerned with when shopping for a new computer? RAM Internal memory Keyboard
Answer:
The answer is RAM
Explanation:
The random access memory (RAM) in your computer is one of the most important components in determining the overall performance of your system. It saves the information that is currently being used by your computer so that it can be accessed quickly in the future. The greater the number of programs running on your system, the more memory you'll require.
All of the following is true about an artificial neural network, or ANN except: a.It identifies patterns that have not been programmed b.It is an optimization tool c.It is a computer system that can recognize and act on patterns or trends it detects in large sets of data d.It functions similarly to the neural circuitry of the brain
Answer:
b. It is an optimization tool
Explanation:
All of the following are true about an artificial neural network, or ANN except:
B. It is an optimization toolAccording to the given text, we are asked to show the odd one out about the artificial neural network or ANN and its functions in the computer network
As a result of this, we can see that the artificial neural network or ANN helps to identify patterns that have not been programmed, functions similarly to the neural circuitry of the brain, recognizes and acts on patterns or trends it detects in large sets of data, but it is not an optimization tool.
Therefore, the correct answer is option B
Read more here:
https://brainly.com/question/19714088
Select the three responsibilities of producers.
providing graphics
being on time
being on budget
being on target
providing collateral content
being error free
What is confidentiality and example?
Answer:
Confidentiality is the act of keeping things private. For example, the Government keeps very important things confidential in order to protect National Security.
Need help: what is 10^2
Answer:
100
Explanation:
Answer:
100
Explanation:
hope it helps
How do i find the minterms
Answer:
I think.....
Explanation:
bylooking
Roz’s teacher says that the assignment for that day is to listen to a speech by President Kennedy. Which of the following files will Robin open to complete the assignment? A. PDF B. docx C. mp3 D. systems software
Answer:
Pretty sure the answer is C. mp3
Explanation:
They have to listen to the speech, not read it or anything, and mp3's are audio files. Hope this helps :D
Answer:
c
Explanation:
source: trust me bro
What critical-thinking tool is being used when asking the question, "Is there a large enough scope of
information?"
O synergy
O breadth
O semantics
O depth
Answer:
breadth
if I am correct.
During the maintenance phase of the software development life cycle, the maintenance team takes steps to _____.
During the maintenance phase of the software development life cycle (SDLC), the maintenance team takes steps to: Assess how the software program is working, so as to keep the system up and running.
Software development life cycle (SDLC) can be defined as a strategic process (methodology) that defines the key steps, phases, or stages for the development (creation) and implementation of high quality software programs (applications).
Generally, there are six (6) main phases involved in the development (creation) of a software program and these include;
PlanningAnalysisDesignDevelopment (coding)DeploymentMaintenanceDuring the maintenance phase of the software development life cycle (SDLC), the software developers usually take feedback from end users, in order to know and understand what is good or bad about their software programs (applications).
Hence, the maintenance team are saddled with the responsibility of using the feedbacks to assess how a software program is working, so as to keep the system up and running.
Read more: https://brainly.com/question/20813142
**IN PYTHON**
Write a program that uses a loop and a half to prompt a user for a password. You should prompt the user for the password. If they get it correct, break out of the loop. If they don’t get it correct, you should give them an error message and ask again.
Sample Run:
Enter password: 123123
Sorry, that did not match. Please try again.
Enter password: password
Sorry, that did not match. Please try again.
Enter password: CODEHS
Sorry, that did not match. Please try again.
Enter password: abc123
You got it!
Note: You need to set SECRET to abc123 to run the tests
Answer:
SECRET = "abc123"
while True:
p = input("Enter password: ")
if p != SECRET:
print("Sorry, that did not match, Please try again.")
else:
print("You got it!")
break
Explanation:
SECRET = "abc123" will be used in the language of python that was created.
What is Python?Python is a PC programming language frequently used to fabricate sites and programming, robotize errands, and direct information examination. Python is a universally useful language. This language tends to be utilized to make a wide range of projects and isn't particular for a particular issue.
To maintain a user attempting to enter the password, we have used a while loop that never ends. We employ an if-else structure in the loop to determine the password. If it is "abc123," the passcode is discovered, and the loop is broken.
SECRET = "abc123"
There is a function and if that is true, then
p = input("Enter password: ")
The if function will be implemented.
if p != SECRET:
print("Sorry, that did not match, Please try again.")
The else function will be implemented:
else:
print("You got it!")
break
Learn more about Python, here:
https://brainly.com/question/30427047
#SPJ3
Each slide in a presentation has a layout that includes placeholders for certain types of content?
True
False
Answer:
True
Explaination:
It has layouts that includes placeholders for images, text and lot more
Each slide in a presentation contains a layout that includes placeholders for certain types of content: True.
What is a slide?A slide simply refers to a single page of a presentation that comprises text-based information or images, which can be used to teach, instruct and educate the audience on a subject matter, topic, event or idea.
In Computer technology, each slide in a presentation contains a layout that includes placeholders for certain types of content such as:
ImagesTextsVideoRead more on slides here: https://brainly.com/question/26187618
#SPJ2
state the differences between selecting a text and highlighting a text as used in computing
Explanation:
The difference between highlighting the text and selecting the text is highlighting is when you change the highlight/back color of the text and selecting is when you temporarily highlight it to change a certain part
What characteristics do black holes have?
For astronomers, the only three measurable physical properties that completely specify the characteristics of a black hole are its mass, its charge, and its angular momentum.
people, hardware, software, data, procedures, and communication network working together to collect, transform and disseminate information called
Answer:
Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.
Explanation:
what is the basic computer application?
Answer:
a computer code
Explanation:
fhfdgkykd
Has digital transmission changed the nature of communication?
Answer:
yes , digital transmission really has changed the communication with the new apps and devices and reduced paper work.