answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
2 years ago
12

External network security threats can include management failure to support organization-wide security awareness, inadequate sec

urity policies, and unenforced security procedures.
A. True
B. False
Computers and Technology
1 answer:
Ganezh [65]2 years ago
6 0

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

You might be interested in
Suppose Dave drops a watermelon off a high bridge and lets it fall until it hits the water. If we neglect air resistance, then t
MaRussiya [10]

Answer:

#include <bits/stdc++.h>

using namespace std;

// driver function

int main()

{

   // variables

  const double g = 9.8;

int sec;

double height;

int    t  = 0;    

double d = 0;    

bool   flag = false;  

// ask to enter time

cout << "Please enter the time of fall(in seconds):";

// read time

cin >> sec;

//ask to enter height

cout << "Please enter the height (in meters):";

//read height

cin >> height;

cout << '\n'

     << "Time(seconds)   Distance(meters)\n"

        "********************************\n";

// calculate height after each seconds

while ( t <= sec) {

cout << setw(23) << left << t

      << setw(24) << left << d << '\n';

// if input height is less

 if ( d > height ) {

  flag = true;

 }

// increament the time

 t += 1;

// find distance

 d = 0.5 * g * (t) * (t);

}

cout << '\n';

// if input height is less then print the Warning

if ( flag ) {

 cout << "Warning - Bad Data: The distance fallen exceeds the height"

         " of the bridge.\n";

}

return 0;

}

Explanation:

Read the time in seconds from user and assign it to "sec" then read height and  assign it to "height".After this find the distance after each second.If the input height is less than the distance at any second, it will print a Warning message. otherwise it will print the distance after each second.

Output:

Please enter the time of fall(in seconds):11                                                                              

Please enter the height (in meters):1111                                                                                  

                                                                                                                         

Time(seconds)   Distance(meters)                                                                                          

********************************                                                                                          

0                      0                                                                                                  

1                      4.9                                                                                                

2                      19.6                                                                                                

3                      44.1                                                                                                

4                      78.4                                                                                                

5                      122.5                                                                                              

6                      176.4                                                                                              

7                      240.1                                                                                              

8                      313.6                                                                                              

9                      396.9                                                                                              

10                     490                                                                                                

11                     592.9  

5 0
2 years ago
The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
Talja [164]

Answer:

The correct answer to the following question will be "Instruction set architecture".

Explanation:

The Instruction Series Design is a component of the system that is accessible to the compiler and the programmer. It is also the distinction between hardware and software. We will describe in detail the set of instructions used in most of the microprocessors that are used today.

The processor ISA can be represented using 5 categories, these are as follows:

  • The RAM Running Memory.
  • Amount of clear operating names.
  • Location of operands.
  • Operations
  • Size and type of the operand.

Therefore, Instruction set architecture is the right answer.

4 0
2 years ago
Workspace How do the following technologies help you in your quest to become a digital citizen: kiosks, enterprise computing, na
adelina 88 [10]

Answer:

1) A kiosk are small platforms that can be used for obtaining information and programming relate to entertainment, transportation, commerce, applications, and other areas. A kiosk is located in busy business areas. With Kiosks, one is able to get answers to important information such as service locations.

2) Enterprise computing is the use of information technologies and computing in organizational setting. Enterprise computing provides improved data security

3) Natural language processing is the artificial intelligence concept that deals with the interaction between man and computer by use of natural language. With natural language processing, it is possible to interact with artificial intelligence application in the same manner we interact with a real person

4) Robotics is concerned with the design construction, and operation of robots. It involves the collaboration of computer science and engineering fields. Robotics provide 24 hours assistance including in inhuman conditions such as low oxygen

5) Virtual Reality (VR) is the creation of easily believable simulation of real life by means of computer technology. With virtual reality, one is able to practice practical  trade skills in their living room

Explanation:

6 0
2 years ago
Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
Pani-rosa [81]

Answer:

lol

Explanation:

I NEED POINTS

5 0
1 year ago
In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
Sedaia [141]

Answer:

Its c

Explanation:

5 0
2 years ago
Other questions:
  • In cell e5, create a formula using the vlookup function to determine the dog type for teen anna morante based on the program cod
    13·2 answers
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • Zoey has brought her computer in for servicing. When she dropped off her computer, she mentioned that her computer will sometime
    15·2 answers
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • The development of the original personal computer (PC) was a(n) __________ innovation at the time, whereas adding a different ki
    8·1 answer
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit,
    11·1 answer
  • He volume of a sphere is 4/3πr3, where π has the value of "pi" given in Section 2.1 of your textbook. Write a function called pr
    5·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of word
    5·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!