Once the system is appropriately built, secured, and deployed, the process of maintaining security is ________.

Answers

Answer 1

Once a computer system is appropriately built, secured, and deployed, the process of maintaining security is continuous.

What is information security?

Information security is a preventive practice that is used to protect an information system (IS) or computer system from potential theft, attack, damage, or unauthorized access, especially through the use of a body of processes and technology.

As a general rule, once a computer system is appropriately built, secured, and deployed, the process of maintaining security is continuous.

Read more on information security here: brainly.com/question/14286078

#SPJ12


Related Questions

Asynchronous software enables team members to work together at _____

Answers

Asynchronous software enables team members to work together at different times.

What is asynchronous software?

An asynchronous operation is known to be the process that operates on its own of other processes.

Therefore, Asynchronous software enables team members to work together at different times.

See full question below

Asynchronous software enables team members to work together at _____.

a. a location in which a server computer is present

b. the same time

c. different times

d. an agreed-upon location

Learn more about Asynchronous software from

https://brainly.com/question/13172436

#SPJ12

How do economists use data? check all that apply

Answers

Economists use data:

To explain trends in production and shipping.To follow and predict unemployment rates.

How do economists make predictions?

Economists  often uses data to make forecast and it is where there is the use of sample data from a population that brings about uncertainty.

Note that Economists use data:

To explain trends in production and shipping.To follow and predict unemployment rates.

See options below

How do economists use data? Check all that apply.

to follow and predict unemployment rates

to communicate with customers instantly

to ship goods to countries all over the world

to explain trends in production and shipping

to apply automation to reduce production costs

Learn more about economists from

https://brainly.com/question/9913581#SPJ12

Outline the steps for logging into E-mail account​

Answers

Answer:

go to your email service provider, type in your username(email) and password click the log in or sign in button to continue

Many things can happen when a large neo strikes earth. Consider only ejecta for a moment. How and why would ejecta affect short term climate (over a few months)?

Answers

The reason and why ejecta can affect short term climate is that Lower global temperatures by blocking incoming energy from the sun.

Why is it vital to decrease global temperature?

A warmer climate is known to often increases public health issues like heat  illnesses and as such, it is vital to lower temperature.

Therefore, in the case above, The reason and why ejecta can affect short term climate is that Lower global temperatures by blocking incoming energy from the sun.

Learn more about ejecta from

https://brainly.com/question/9928957

#SPJ12

According to the rules of precedence which operator will be evaluated first?

Answers

Based on the rules of precedence the operator that will be evaluated first is AND.

What Does Precedence Mean?

Precedence, in C#, is known to be a kind of rule that tells the order in which a specific operations need to be carry out in an expression.

Note that Based on the rules of precedence the operator that will be evaluated first is AND.

Learn more about precedence from

https://brainly.com/question/1964725

#SPJ12

Part B
Select a student organization belonging to the Career and Technical Student Organizations (CTSO) of your choice in which you would like to
participate. You should choose a CTSO related to the field of computers. Research online and create a brief report on the mission of the
organization, and state the reason why you want to participate in this organization.
You roay use online resources to find information about the organization

Answers

My choice of the  student organization that is belonging to the Career and Technical Student Organizations (CTSO) is DECA.

What is DECA about?

DECA is known to be a type of CTSO that is said to allow or aid students to be able to create college and career readiness form of skills.

Note that DECA is based  on helping students to be very prepared for careers in in areas of:

Business Management and AdministrationFinanceHospitality & TourismMarketing

Learn more about CTSO from

https://brainly.com/question/10917703

#SPJ1

is it possible to use this cpu with mb still even with the warning?

Answers

The problem with the incompatibility of the CPU with the motherboard cannot be solving without the update.

What is Ryzen 9 5950X ?

It is a gaming CPU that is able to perform the multithread operations. The compatibility of CPU with the motherboard will form the type of socket supported by between the CPU and motherboard.

The updating of BIOS version made the compatibility of the software with the computer module. However the incompatibility of the motherboard with the CPU can not be corrected without the change in the BIOS update to establish the communication.

Learn more about motherboard, here:

https://brainly.com/question/14511803

#SPJ1

The order in which controls receive the focus is called the ________

Answers

The order that controls receive the focus is called the tab order.

What is the Tab Order?

This us known to be the order or sequence that a given cursor moves in regards to one or from one field to another field.

Therefore, The order which controls receive the focus is called the tab order.

Learn more about Tab order from

https://brainly.com/question/8887133

#SPJ12

The process of creating and maintaining information systems is called

Answers

The process of creating and maintaining information systems is called system development.

What is system development?

System development is the process of defining, designing, testing, and implementing a new software application or program.

System development has a life cycle. This simply means that it follows stages. The primary stages are as follows;

Planning stageAnalysisDesign Development TestingImplementation.Operation and maintenance.

learn more on system development here: https://brainly.com/question/13042526

#SPJ12

An error in a program that involves a violation of language rules will be detected at

Answers

An error in a program that involves a violation of language (syntax) rules will be detected at compile time.

What is a compiler?

A compiler refers to a software program that is designed and developed to translate the entire source code of program at once, so as to produce object code.

Thus, a compiler translates a software program that is written in a high-level language into low-level language (machine language).

In conclusion, we can deduce that an error in a software program that is associated with a violation of language (syntax) rules will be detected at compile time.

Read more on programs here: brainly.com/question/26324021

#SPJ12

24 3 Ans a. Define the term computer hardware. b. C. What are input devices? List any two input devices. What is processing device? Write the name of processing devices d. What are output devices? Name any two common output devices Differentiate between soft copy output and hard copy output? f. What are storage devices? Write two such devices. e. g. What is primary memory? What are its types. h. What are the differences between RAM and ROM? i. What is CPU? List its major parts. j. Write short notes on the following: i. Keyboard Rising School Level Computer Science - 6 ii. Control unit iii. Printer​

Answers

Explanation:

hardware are the physical parts of the computer which can be touched seen and felt is called hardware.

the device which are use to inter data and instructions from the user is clawed input device. foreg; keyboard , mouse.

the processing device of computer is cpu

the printed information which can be touched and seen is Called hardcopy .

soft copy are which can be seen but not touched is called soft copy .

the device that are use to store data and instructions is called storage devices.

Question 3 of 20
All of the following are examples of associate's degrees except.
O A. Associate of Medicine.
OB. Associate of Science.
OC. Associate of Arts.
OD. Associate of Applied Science.

Answers

Answer:

A. Associate of Medicine

Explanation:

If it is wrong, sorry but I think its that one

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:

Answers

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

What is optional parameter?

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

what is one of the key components of a typical formula?

Answers

A formula key components are:

FunctionsReferencesOperatorsConstants.

What is a formula?

This is known to be a kind of mathematical relationship or rule that is said to be expressed in form of symbols.

Note that function is the association between a set of inputs that is said to have one output and all function do contain a domain and range.

Therefore, A formula key components are:

FunctionsReferencesOperatorsConstants.

Learn more about formula from

https://brainly.com/question/2005046

#SPJ11

After a group sets a project schedule, members should be prepared to
O make periodic adjustments on an as-needed basis.
make changes when some members fall behind.
drop other activities so they can complete their job on time.
complete a study-time survey to prove they can do the work.

Answers

After a group sets a project schedule, members should be prepared to complete a study-time survey to prove they can do the work.

What is a group project?

A group project is a project in which more than one person work together. Group projects are given to improve the work, as various minds can bring out various implements for the project.

Thus, the correct option is D. complete a study-time survey to prove they can do the work.

Learn more about group project

https://brainly.com/question/14488746

#SPJ1

Answer:

A on edge

Explanation:

When you use the implicit syntax for coding joins, the join conditions are coded in the ____________ clause.

Answers

When you use the implicit syntax for coding joins, the join conditions are coded in the WHERE clause.

What is syntax?

It should be noted that syntax simply means the rule that defines the language structure in programming.

In this case, when you use the implicit syntax for coding joins, the join conditions are coded in the WHERE clause.

Learn more about syntax on:

brainly.com/question/21926388

#SPJ12

With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them

Answers

With the use of Push technology, a web server delivers information to users, who have signed up for the service.

What is  push technology?

This is known to be Software that automatically send information to users. via a Web browser, e-mail, or others.

Note that in the case above, With the use of Push technology, a web server delivers information to users, who have signed up for the service.

Learn more about Push technology from

https://brainly.com/question/9165574

#SPJ12

You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?

Answers

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

What is role-based access control (RBAC)?

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: https://brainly.com/question/14267297

#SPJ12

Salesforce cpq the sales operations team at universal containers used the create order button to generate an order with only half of the available quote lines and then the team selects the ordered checkbox. what updates should the sales operations team expect

Answers

The updates  that the sales operations team should  expect is A second Order is generated with the remaining Quote Lines.

What do sales operations teams do?

Sales operations teams are known to be people that work on or monitors the administrative and technical tasks that can be a burden to salespeople.

Therefore, in the case above, The updates  that the sales operations team should  expect is A second Order is generated with the remaining Quote Lines.

See full question below

The sales operations team at Universal Containers used the Create Order button to generate an Order with only half of the available Quote Lines and then the team selects the Ordered checkbox.

What updates should the sales operations team expect?

A. An Order without Order Products is created.

B. The existing Order is updated with the remaining Quote Lines.

C. A second Order is generated with the remaining Quote Lines.

D. An error is thrown informing the user an Order already exists.

Learn more about  sales operations  from

https://brainly.com/question/26175085

#SPJ1

30 POINTS FOR THE CORRECT ANSWER
Now that you have a solid understanding of the history, principles, elements, typography, and colors used in graphic and web design, what do you think is the most critical part of creating a design that gets the right response from your target audience? Your answer must include your thoughts on what part is most important, why it is most important, and an explanation of how you would go about creating a design based on your choice. Your answer must mention and be supported with information from each of the lessons in the unit.

Answers

Answer:

Whether it’s on our phones, in books or on websites, we’re constantly digesting written words. From instruction booklets to shop fronts, type is all around us. We often reflect on the power of the written word, but rarely do we consider the designer’s role in emulating the tone of the word or sentence.

Behind the scenes, a designer has taken the time to consider the relationship between the look of the text and what the text says. In reality, different moods, atmospheres and emotions can be expressed simply through the type choice. But what actually is typography—and why is it so vital?

In this article, we’ll lift the lid on everything you need to know about typography. We’ll start with the definition of typography, including a brief history of its origins. We’ll then address the benefits of good typography and the impact it can have on your users. Finally, we’ll look into the different elements that comprise typography, and what they all mean.

Here’s what we’ll cover:

What is typography?

Why is typography important?

The different elements of typography

How to choose the correct typeface for your website

Conclusion

Angela is considering buying stock in a popular computer software company whose price has dropped significantly in the last year. Why might this be a wise move for angela to make?

Answers

Th right decision for Angela to make is that It is better to buy when prices are low and then she sell when prices are high.

What is the decision about?

In the case above, it is better that Angela made a better decision because  it is easy and good in terms of profit that she will earn for her to buy when prices are low and then sell when prices are high.

Therefore, Th right decision for Angela to make is that It is better to buy when prices are low and then she sell when prices are high.

See full question below

Angela is considering buying stock in a popular computer software company whose price has dropped significantly in the last year. Why might this be a wise move for Angela to make? because it is smart to buy when prices are high and sell when prices are low because it is smart to buy when prices are low and sell when prices are high because her investment will be guaranteed by the government if the company fails because the company will rebound because she likes to use the products they sell

Learn more about stock from

https://brainly.com/question/13928270

#SPJ12

What tool can you use to identify a secure location.

Answers

The tools used to identify secure location are Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust and WPScan.

What is website security check tools?

The Website Security Check tool is used to scan and check safety of the websites and to look after the websites related problems faced by the users.

It also helps the users in whether the website is safe to visit or not and to share the information with.  

Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust, and WPScan are some of the tools used to determine secure locations.

Learn more about  website security here:

https://brainly.com/question/12588992

#SPJ1

A(n) ____________ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run a shared application.

Answers

Answer:

cluster

Explanation:

A cluster in a computer system is a collection of servers and other resources that work together to provide high reliability and, in certain situations, load balancing and parallel processing.

Which device allows users to directly hear data from a computer

Answers

Answer:

peripheral device

Explanation:

allows us users to visualize or hear the information stored inside personal computers.

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you prefer.
Classified the two ways above under the forms of information system and explain the merits and demerits of both

Answers

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

What are the benefits and drawbacks of the usage of an ATM card?

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

https://brainly.com/question/19185661

#SPJ1

What's the commission payout for auto bill pay if sold with a ga?
o a. $5
o b. $1
o c. $3
o d. $2

Answers

A person can get a pre-agreed commission for each product sold and this is popular among realtors and house agents.

What is a Commission?

This refers to the service charge that a person charges his client for the fulfillment of a business commitment and is usually in percentages.

For example, a sales rep can be given a 5% commission for each sold car. Therefore, if he sells a car that is worth $20,000, then his commission would be:

5/100 * 20,000

= $1,000.

Hence, we can see that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about commissions and discounts here"

https://brainly.com/question/14776720

#SPJ1

Question 1 Fill in the blank: Internet search engines are an everyday example of how Boolean operators are used. The Boolean operator _____ expands the number of results when used in a keyword search. 1 point NOT WITH AND OR

Answers

The Boolean operator OR expands the number of results when used in a keyword search. Thus, the correct option is D.

What is the Boolean operator?

The Boolean operator may be defined as an important tool that is utilized in the programming languages for the junctions to integrate or exclude keywords in a search, resulting in more attention and generative outcomes.

The Boolean operators are major of three types with specific functions and properties. They are:

ANDNOTOR

Therefore, the Boolean operator OR expands the number of results when used in a keyword search. Thus, the correct option is D.

To learn more about Boolean operators, refer to the link:

https://brainly.com/question/1675220

#SPJ1

a) The____style formats only character, not paragraph.

Answers

Explanation:

styles are a collection of rules that define the way you are text behaves and looks they contain for wedding both for the characters fonts colour scale extra and the paragraph indents align hyphenation

you are troubleshooting physical layer issues with the gi0/1 interface in a router. you need to view and analyze the number of collisions detected on the interface. which command should you use?

Answers

A command which you should use to view and analyze the number of collisions is show interfaces gi0/1.

What is a command?

A command is the set of instructions that is used to configure a network device such as a router, in order to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, show interfaces gi0/1 is a command which you should use to view and analyze the number of collisions.

Read more on commands here: brainly.com/question/17147683

#SPJ11

In estimating the accuracy of data mining (or other) classification models, the true positive rate is

Answers

In estimating the accuracy of data mining, the true positive rate is option A) the ratio of correctly classified positives divided by the total positive count.

What is Data mining?

Data mining is the act of sorting in or through a big data sets to know patterns and linkages that can help handle business problems via data analysis.

Note that in the case above, In estimating the accuracy of data mining, the true positive rate is option A) the ratio of correctly classified positives divided by the total positive count.

See options below

A) the ratio of correctly classified positives divided by the total positive count.

B) the ratio of correctly classified negatives divided by the total negative count.

C) the ratio of correctly classified positives divided by the sum of correctly classified positives and incorrectly classified positives.

D) the ratio of correctly classified positives divided by the sum of correctly classified positives and incorrectly classified negatives.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ12

Other Questions
Mr. Browner has 7 keys. He has 1 keyfor his home, 2 keys for his car, andthe rest are for drawers in his office.If Mr.Browner picks one of his keyswithout looking, what is the probabilityit is for his car? Options: 1/7, 2/7, 3/7, 5/7, 6/7 What is the meaning of the word entender?O to believeO to playO to understandto feel Which would a scientist most likely do before asking a question that could lead to a scientific experiment?. Conteste lasiguiente pregunta.Cundo tienesque entregar tu tarea de geografa?A. Si, quiero estudiar geografa.B. Tengo que entregrsela a mi profesora.C. Tengo tres tareas.D. Tengo que entregarla el prximo jueves. Enter a formula in cell E4 to calculate how long each item has been on sale. This is calculated by subtracting the launch date in cell D4 from the Data Updated date in cell C20. To show the time in years, divide that result by 365. Use an absolute reference to the date in cell C20. Copy the formula from cell E4 to cells E5:E14. Which of the following contributes to antibioticresistance?A- giving antibiotics to livestock B- taking multiple antibiotics at the same time C- going to the doctor when an infection appears Edith, a 45-year-old journalist, alternates between extreme sadness and lethargy and extreme euphoria and overactivity. The drug most likely to prove beneficial to her is: How many toothpicks can be shoved in a human ear theoretically? I plan on breaking a record and I seriously need this information!!! Corporate executives realize that if they can establish ideological outposts in the minds of people, they can use those outposts to. Using Triangle Congruence Theorems The conquistadors of Spain were financed and outfitted by the Spanish crown.TrueFalse among these properties of acids basses or both which property is specific to acids only? A. accepts protons B. bitter taste C. electricity conductive D. slippery feel Please help thank you cos2pi/7+cos4pi/7+cos8pi/7=1/8 proteins not expressed on normal cells but found on tumor cells are called _____. If Jenny walks 2 miles in 40 minutes, then Jenny will walk how far in 100minutes if she walks at the same speed the whole time? If necessary, roundyour answer to the nearest tenth of a mile. name the tissue responsible for transporting water mineral salts and food in plants Jay works the third shift, from 11:00 P.M. to 7:00 A.M. In order to feel more alert on his drive home, he often chooses to take _____, which are a category of drugs that help to wake him up and feel fresher. Please choose the correct answer from the following choices, and then select the submit answer button. depressants narcotics hallucinogens stimulants Which of the following provides the best example of how nutrition can be impacted by community resources? ______,while holding demand constant, results in an increase in the equilibrium price of the good, but a decrease in the equilibrium quantity of the good.