1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
14

In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide r

ange of tasks, such as network security, device provisioning, and application patching/deployment. which security operation is being carried out by this team?
Computers and Technology
1 answer:
jasenka [17]3 years ago
6 0

The security operation being carried out by this team is Administrative in nature.

<h3>What is the role of an Administrators?</h3>

An Administrators is known to be a person who works or handles the day-to-day deployment, operation and looking of an IT environment.

Note that their areas of concern are the systems, networks and applications as well as others and as such, The security operation being carried out by this team is Administrative in nature.

Learn more about  security operation from

brainly.com/question/371967

#SPJ1

You might be interested in
Which practice is the safest way to sit at a desk while typing on the computer?
qwelly [4]
Lol just lay back and unleash your gamer side
8 0
4 years ago
The best way to insert an existing Excel chart into a document is to
nlexa [21]

B. Click the Insert tab and choose chart.

7 0
4 years ago
Read 2 more answers
What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
Alla [95]

Explanation:

The string "1301" can be converted into numbers by using the ASCII characters set.

1. Decimal ASCII

1=49, 3=51, 0=48, 1=49

Without space

"1301" = 49 51 48 49

with space included

"1 3 0 1" = 49 32 51 32 48 32 49

(white space is represented by 32 in Decimal ASCII)

2. Hexadecimal ASCII

1=31, 3=33, 0=30, 1=31

Without space

"1301" = 31 33 30 31

with space included

"1 3 0 1"= 31 20 33 20 30 20 31

(white space is represented by 20 in hexadecimal ASCII)

The magnitude can be found by traditional decimal to binary conversion (Divide by 2 until we are left with remainder 0 or 1) and sign can be represented by adding most significant bit (MSB) 0 for positive and 1 for negative.

A. -27

Magnitude: 00011011

Since the sign is negative add 1 to the MSB

which becomes 100011011

B. 140

Magnitude: 10001100

Since the sign is positive add 0 to the MSB

which becomes 010001100

C. -99

Magnitude: 01100011

Since the sign is negative add 1 to the MSB

which becomes 101100011

D. 46

Magnitude: 00101110

Since the sign is positive add 0 to the MSB

which becomes 000101110

7 0
3 years ago
Which of the following websites can help you learn about general career trends? A. Bureau of Labor Statistics B. Career Cruising
Alik [6]
B hope this helps, can you make me brainliest if it is right?
7 0
4 years ago
Rules that govern how to communicate online are known as etiquette. netiquette. Internet laws. computer rights.
azamat

Answer:

Explanation:

i think it might be netiquette

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is basic function of an operating system?
    10·2 answers
  • A #1 Phillips screwdriver has a shaft diameter of 
    13·1 answer
  • If my computer is next to my book, what preposition would I use?<br> O xià<br> 0 shàng<br> pangbian
    7·1 answer
  • Is something wrong with Brainly?
    5·2 answers
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • Alan is quite surprised to see thats his computer has been running slower than usual. Which of the following steps or actions sh
    14·1 answer
  • What happens when you leave a tablet charging for two days?
    13·1 answer
  • Dr.Sanchez is creating a quiz for a history class. It will have true or false questions. What kind of variable will be needed to
    10·2 answers
  • A person who breaks into a computer, network, or online site is called
    14·2 answers
  • Do you need to have java on your computer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!