Explanation:
It is important to ensure that your software is up to date simply because these updates often provide critical patches to security issues. These patches are to terminate any bugs or exploits that may cause harm to your computer system, and even your personal data. Updating your software allows the program to remove old outdated features, while installing newer/better features. They will often improve the stability and preformance as well.
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices
Group of answer choices.
a. firewalls
b. access controls
c. proxy servers
d. All of the above
Answer:
d. All of the above
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.
A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device.
A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.
Answer:
10%
Explanation:
100 / 10 = 10
What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data
Answer: Lossless Compression
Explanation:
The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.
Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.
A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.
Explanation:
oi.........................
A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?
Answer:
Key escrow
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In conclusion, the option which the company should use is a key escrow.
Ricard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages. The use of these codes in this context indicates that Ricard understands:
Answer: pragmatics
Explanation:
Pragmatics simply means the study of how words are used. It's the study of signs and symbols. Pragmatics includes speech acts, implicature, and conversation.
Since Richard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages, then the use of these codes in this context indicates that Ricard understands pragmatics.
Just as SQL is the query language for relational databases, _________ is the query language for Mongo databases.
Answer:
MongoDB Query Language (MQL)
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.
A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.
Just as structured query language (SQL) is the query language for relational databases, MongoDB Query Language (MQL) is the query language for Mongo databases.
Some of the basic operations used in MongoDB are create, index, update, delete, and find record.
Discuss the entity integrity and referential integrity constraints. Why is each considered important
Answer:
Referential integrity, is the condition with the rule that foreign key values are always valid, and it is founded on entity integrity. Entity integrity, makes certain, the condition that there is a unique non-null primary key for every entity. The parent key functions as the source of the unique identifier for a set of relationships of an entity in the referential constraint parent table, and defining the parent key is known as entity integrity
Explanation:
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files.You want the connection to be as secure as possible. Which type of connection will you need?
Answer:
The answer is "Remote access "
Explanation:
The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.
Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.
explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace
Answer:
The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.
write history of computer virus. I will mark as brainliest answer
Answer:
The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
Answer:
443
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.
Hence, the port that needs to be enabled to allow secure transactions is port 443.
Which command entered without arguments is used to display a list of processes running in the current shell
Answer:
ps
Explanation:
In Unix and Unix-like operating system, the command used to display the list of processes running in the current shell is ps. For each of these processes, the following details are displayed;
i. PID which indicates the id of the process
ii. TTY which indicates the type of terminal from which the process is running.
iii. TIME which represents the CPU time consumed by the the process and its sub-processes.
iv. CMD which represents the command that runs as the current process.
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?
Answer:
There must be a proxy server that is not allowing access to websites
Explanation:
A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Answer:
Compactness
Explanation:
Have a nice day!
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
what is the best college in texas for cyber security
Answer:
Cybersecurity education in Texas There’s no doubt that cybersecurity education in Texas is in a league of its own. Out of all of the Lone Star State’s universities, the University of Texas at San Antonio is the number one choice for many budding cybersecurity professionals.
List three ways of breaking a copyright law with the illegal copy of software.
Answer:
Using itSelling it Giving it to someone.Explanation:
Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.
If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.
4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed
Answer:
algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
An algorithm using pseudocode that allows two players to play the game is:
BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER losesWhat is a Pseudocode?This refers to the use of plain language to describe the sequence of steps for solving a problem.
Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.
Read more about pseudocodes here:
https://brainly.com/question/24953880
#SPJ2
Of the people working in concert with security teams to ensure data quality and protection, the head of information management is responsible for executing policies and procedures, such as backup, versioning, uploading, and downloading. True False
Answer:
true
Explanation:
because Internet
because Internet
To add a picture file to a PowerPoint slide, a user should first go to the
Answer:
insert
Explanation:
go to power point presentation insert tab
A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable for at least an eight-hour window as part of the response and recovery controls implemented. Which redundancy effort should be put in place to ensure the data remains available?
Answer: UPS
Explanation:
The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).
Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.
If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search
Answer:
n/2
Explanation:
A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.
IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector that are greater than zero in reverse order, each on a new line.
Ex: If the input is -19 34 -54 65 -1, the output is:
65
34
#include
#include
using namespace std;
int main() {
/* Your solution goes here */
return 0;
}
The program is an illustration of vectors; vectors are data structures that are used to hold multiple values in one variable name
The main programThe program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
#include <vector>
using namespace std;
int main(){
//This declares the vector
vector<int> nums;
//This declares an integer variable
int num;
//Thie gets the first input
cin>>num;
//This loops is repeated until the user enters -1
while(num != -1){
nums.push_back(num);
cin>>num; }
//This iterates through the vector
for (auto i = nums.begin(); i != nums.end(); ++i){
//This checks if the current element is above 1
if(*i > 0){
//If yes, the element is printed
cout << *i <<endl;
}
}
return 0;
}
Read more about C++ programs at:
https://brainly.com/question/24027643
What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.
define Microsoft Excel 2010
Answer:
a very very old Microsoft application that only people on old pc's use now
Explanation:
Answer:
Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.
This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.
Explanation:
In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.
Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.
The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture, curate, and consume customer information to improve their services?
Answer: Data and Insights
Explanation:
Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.
Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files
Answer:
National Software Reference Library (NSRL).
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.