1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
8

Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the s

ystems to determine their configuration and verify compliance. When the scans are complete, the tool would provide a report listing all systems that are out of compliance, including specific issues. What type of tool is being described
Computers and Technology
1 answer:
lukranit [14]3 years ago
4 0

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

<h3>What are compliance tools?</h3>

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

brainly.com/question/24338783

#SPJ1

You might be interested in
Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
SSSSS [86.1K]
I’m pretty sure it’s C good luck luv
8 0
4 years ago
____ elements are arranged to show which tasks must be completed before subsequent dependent tasks can begin.
Masteriza [31]
The answer is Gantt Chart
5 0
4 years ago
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
riadik2000 [5.3K]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

       System.out.println("Enter a character");

       Scanner in = new Scanner(System.in);

       char character = in.next().charAt(0);

       System.out.println("Enter a string");

       String string = in.next();

//Calling the method        

System.out.println(countChar(character,string));

   }

   public static int countChar(char a, String in){

       int counter =0; // initialize counter

       for (int i=0;i<in.length();i++){

           if(a == in.charAt(i))

               counter++;

       }

       return counter;

   }

}

Explanation:

This program is written in Java Programming language.

We created a method countChar that returns a integer called counter

Using a for loop in the method we iterate through the string object and check (a == in.charAt(i)) so as to increase counter when ever there is a match.

In the main method a Scanner Class is used to request user to input a character and a string which is passed to countChar when called.

NOTE that this program has considered lower case letters to be different from upper cases as such a is not equal to A

3 0
3 years ago
Which of the following are disadvantages of networks? Check all of the boxes that apply.
RideAnS [48]

Answer:

• Network intruders can access all computers on a network.

• Networks are costly to set up.

Explanation:

A network can be defined as a connection between the internet and the computer. A network is a means by which information or data are transmitted from one computer to another.

We have various types of networks and some of them are:

a) Local Area Network (LAN)

b) Wireless Local Area Network (WLAN)

c) Wide Area Network (WAN)

d) Campus Area Network (CAN)

e) Metropolitan Area Network (MAN)

f) Personal Area Network (PAN) e.t.c

The disadvantages of network are:

a) Network intruders such as computer hackers can easily access all computers on a network.

b) Networks are costly to set up.

It is of outermost importance that a network used by a computer is secured using security such as encryption in other to prevent data loss , hackers and exposure of information that are sensitive to computer users.

4 0
3 years ago
No links it’s just a normal question about iPhones.
Zolol [24]
I’ll give a you a good guess because I’ve only deleted a whole conversation like 3 times. I honestly feel like eventually there will be a warning on deleting the full conversation or on the other hand nothing may happen; or that it will automatically stop you from deleting the conversation.
6 0
3 years ago
Other questions:
  • Imagine you just bought a cable installation company that routinely treats its residential customers poorly. You want your compa
    11·1 answer
  • You use worksheets to perform calculations. How do you perform these calculations? ______ are used for performing calculations i
    12·2 answers
  • The creation of​ __________ with digital media allows for large quantities of numerical or textual data to be searched online by
    10·2 answers
  • Which of the following commands would you use to start the program Main with four strings? a. java Main arg0 arg1 arg2 arg3 b. j
    11·1 answer
  • The QWERTY keyboard is the most common layout of keys on a keyboard. <br> a. True<br> b. False
    8·2 answers
  • In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least
    10·1 answer
  • I think it is a or c is it right?
    7·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    9·1 answer
  • The advantages and disadvantages of internet​
    6·1 answer
  • HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!