answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
2 years ago
7

In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr

otection software and firewalls in all its employees' computers. This is a form of ________ planning.
Computers and Technology
2 answers:
Vinil7 [7]2 years ago
8 0

Answer:

The answer is antivirus solution implementation and planning.

Explanation:

Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.

Alexeev081 [22]2 years ago
4 0

Answer:

hi your question lacks the options here is the complete question and its options

In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus protection software and firewalls in all its employees' computers. This is a form of ________ planning.

tactical

strategic

executive

contingency

static

Answer : contingency planning

Explanation:

The installation of computer viruses protection software and firewalls in all its employees' computers is a form of risk management undertaken by the company to prevent the possible attack of the recent computer virus outbreak on their employees systems.

The risk management method is known as a form of contingency planning which means a plan set in place against any unusual activity that might occur. like with the possible attack by the computer virus on their employees computer systems.

You might be interested in
Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
Andru [333]

Answer:

The following are the code to this question:

code:

System.out.println(x);  //use print method to print value.

Explanation:

In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.  

In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.

It's to demonstrate that the input/output or testing requirements function throughout the model.

5 0
2 years ago
After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on
Vikentia [17]

Normally active directory once is corrupted best method is to repair the active directory. As IT administrator user has keep a proper backup either date wise or weekly wise.

<u>Explanation:</u>

If IT administrator doesn’t have enough backup restore or repairing the active directory is highly impossible.

Before restore proper information to be made and rebooted the domino server and selected advance boot option and select the restore options. And select the proper and good backup and restore it. After restoring the backup domain server started and domain active directory should work proper.

As experience better to reinstall domain server and active directory is good practice.

5 0
2 years ago
2. Because technology is always changing, there are new applications being developed constantly. (1 point)
Zepler [3.9K]
True because we need new tech
4 0
2 years ago
Read 2 more answers
(NumberFormatException)Write the bin2Dec(String binaryString) method to convert a binary string into a decimal number. Implement
tresset_1 [31]

The following program will be used that prompts the user to enter a binary number as a string and displays decimal equivalent of the string.

<u>Explanation:</u>

NumberFormat.java

import java.util.Scanner;

public class NumberFormat{

public static void main(String[] args) {

      Scanner scan = new Scanner(System.in);

      try{

      System.out.println("Enter a binary string:");

      String s = scan.next();

      int integerValue = bin2Dec(Integer.parseInt(s));

      System.out.println("The decimal value of "+s+" is "+integerValue);

      }

      catch(NumberFormatException e){

          System.out.println(e);

      }

  }  

  public static int bin2Dec(int binaryNumber) throws NumberFormatException{

  int decimal = 0;

  int p = 0;

  try{

  while(true){

  if(binaryNumber == 0){

  break;

  } else {

  int temp = binaryNumber%10;

  decimal += temp*Math.pow(2, p);

  binaryNumber = binaryNumber/10;

  p++;

  }

  }

  }

  catch(NumberFormatException e){

      throw new NumberFormatException("Invalid binary number");

  }

  return decimal;

  }

}

Output:

Enter a binary string:

1011000101

The decimal value of 1011000101 is 709

5 0
2 years ago
Anime question where do i watch Itadaki! Seieki! 100 points
EastWind [94]

Answer:

Crunchyroll or Funamation

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • If the__________ is/are out of balance, the driver will feel a pounding or shaking through the steering wheel.
    7·2 answers
  • The navigation bar on the left side of ____ view contains commands to perform actions common to most office programs.
    15·1 answer
  • Which description of the plain text file format is most accurate?
    11·2 answers
  • . When you have multiple graphics positioned on a page, you can _______________ them so that they are a single graphic instead o
    9·1 answer
  • Need 2.5 Code Practice Answers
    14·2 answers
  • _____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, wh
    8·1 answer
  • ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equiva
    14·1 answer
  • Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the
    8·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • Which of the following is not an advantage of a flowchart?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!