answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
2 years ago
7

In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr

otection software and firewalls in all its employees' computers. This is a form of ________ planning.
Computers and Technology
2 answers:
Vinil7 [7]2 years ago
8 0

Answer:

The answer is antivirus solution implementation and planning.

Explanation:

Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.

Alexeev081 [22]2 years ago
4 0

Answer:

hi your question lacks the options here is the complete question and its options

In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus protection software and firewalls in all its employees' computers. This is a form of ________ planning.

tactical

strategic

executive

contingency

static

Answer : contingency planning

Explanation:

The installation of computer viruses protection software and firewalls in all its employees' computers is a form of risk management undertaken by the company to prevent the possible attack of the recent computer virus outbreak on their employees systems.

The risk management method is known as a form of contingency planning which means a plan set in place against any unusual activity that might occur. like with the possible attack by the computer virus on their employees computer systems.

You might be interested in
PLSSSSSSSSSSSSSSSSSS HELPPPP I NEED THE ANSWER FAST!!! if an item that is purchased is digital, this may involve a direct (blank
Artist 52 [7]
The answer is
: deposit
8 0
2 years ago
Read 2 more answers
What is the value of the variable named myNum after the statements that follow are executed? var myNum = 14; var yourNum = 4; my
Lostsunrise [7]

Answer:

45

Explanation:

Initially, myNum is equal to 14 and yourNum is equal to 4

Then, myNum is incremented by 1 and becomes 15

Also, yourNum is decremented by 1 and becomes 3

Finally, myNum is set to myNum x yourNum, 15 x 3 = 45

8 0
2 years ago
A file ____ includes the three or four characters that follow the dot in the filename and identify the files type.
vodka [1.7K]
A file extension includes the three or four characters that follow the dot in the file name
6 0
2 years ago
Read 2 more answers
In a certain game, a player may have the opportunity to attempt a bonus round to earn extra points. In a typical game, a player
Assoli18 [71]

Answer:

С The player had 3 bonus round attempts and 7 of them earned extra points.

Explanation:

Given

See attachment for correct code segment

Required

Which of the options is not possible?

From the question, we understand that:

attempts \to [1,4] --- attempt can only assume values 1, 2, 3 and 4

The following "if statement" is repeated three times

<em>IF RANDOM[1,10] <= 7:</em>

<em>    success = success + 1</em>

This implies that the maximum value of the success variable is 3

The first printed value is the attempt variable

The second printed value is the success variable.

From the list of given options, (a), (b) and (d) are within the correct range of the two variable.

While (c) is out of range because the value printed for variable success is 7 (and 7 is greater than the expected maximum of 3)

8 0
1 year ago
A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
Butoxors [25]

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

5 0
2 years ago
Other questions:
  • The overall purpose of CSS is to modify the way web pages look without modifying the underlying HTML code. way tables render in
    12·2 answers
  • B.) Define latency and jitter for service flow in a fixed wireless system.
    11·1 answer
  • The final step of the DHCP Discovery process is known as ______.
    5·1 answer
  • Memory is a _____________ that includes the organization and shaping of information by processing, storage, and retrieval of inf
    15·1 answer
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    9·2 answers
  • Define and test a function myRange. This function should behave like Python’s standard range function, with the required and opt
    11·2 answers
  • Which of the following is an absolute cell reference
    10·1 answer
  • In this lab, you use the pseudocode in figure below to add code to a partially created Python program. When completed, college a
    11·1 answer
  • Suppose that each row of an n×n array A consists of 1’s and 0’s such that, in any row i of A, all the 1’s come before any 0’s in
    15·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!