1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
14

Name all of the gates used in programming.

Computers and Technology
1 answer:
Sindrei [870]3 years ago
7 0

Answer:

BUFFER GATE, NOT GATE, OR GATE, AND GATE, NOR GATE, NAND GATE, XOR GATE and , XNOR

You might be interested in
True or False: It is the CISO❝s responsibility to ensure that InfoSec functions are performed within an organization. A) True B)
algol [13]

Answer: True

Explanation: CISO(Chief information security officer) is the officer that is responsible for the information security(Infosec) function to be implemented in the organization.He/she manages the procedures, protect from the threats in business, secures the enterprise communication.

The post of CISO is considered as a senior level officer .The responsibilities of the CISO also includes getting along with other section of the organization and assuring about the smooth and secured processing of the business work as the aspect of information security.Thus the statement given is true

3 0
3 years ago
Besides regulating traffic __________ help warn and direct drivers
Sav [38]
The answer is pavement markings. Hope I helped! :)
5 0
4 years ago
Read 2 more answers
Someone help me to create book-r-us database design with logical and physical diagram
icang [17]
Hey men, i recommend, not saying that here, do that with a friend or someone but no here aight? <span />
6 0
4 years ago
An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
Readme [11.4K]

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

7 0
3 years ago
If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the
goldfiish [28.3K]

Answer:

b. False

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Pub-Sub design pattern is an abbreviation for publish-subscribe design pattern and it refers to a type of architectural design pattern that typically involves using a framework that enables the exchange of messages from the senders (publishers) to the recipient of the messages (subscribers) without having to program the messages.

Hence, if you are able to anticipate that the components are likely to be reused in future projects then it is advisable to use the Pub-Sub design pattern.

7 0
3 years ago
Other questions:
  • ​the unified modeling language (uml) represents an object as a _____ with the object name at the top, followed by the object's a
    7·1 answer
  • My window key dont work and I dont have a fn button, what can I do?<br> PLS help me.
    12·1 answer
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
    11·1 answer
  • Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
    13·1 answer
  • Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicab
    15·1 answer
  • How long will my chromebook last if it is at 30 percent
    9·1 answer
  • . Write the advantages and disadvantages of CLI?
    14·2 answers
  • Which of the following is NOT true about a USB stick?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!