1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
2 years ago
13

Many who enter the field of information security are technical professionals such as __________ who find themselves working on i

nformation security applications and processes more often than traditional IT assignments.
Computers and Technology
1 answer:
Fynjy0 [20]2 years ago
3 0

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

You might be interested in
Are engineers who help to develop products and projects by creating technical drawings
Alinara [238K]

Answer:

This is true but an Engineer is much more than that. They are the professionals of engineering, who do the invention, analyze, design and test complex systems, machines, structures, machines for fulfilling the functional objectives gadgets as well as the requirements while taking into consideration the limitations that come up due to practicality, safety, regulations, and cost.

Explanation:

Please check the answer section.

8 0
3 years ago
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell r
timama [110]

The equations that uses addition, subtraction, multiplication and division operators and other values in a spread sheet is known as formulas. They are a way of having to provide symbols in means of expressing information regarding a mathematical formula that are being solved or showing its solution along with it.

4 0
3 years ago
assume that youre creating a website for a school. you want to insert pictures of students and teachers. which tag will you use
sammy [17]

<u>Tag to insert pictures of students and teachers:</u>

While creating a website for a school, the developer would like to make it more attractive and appealing by adding hyperlinks, images, and videos.

In order to insert pictures of students and teachers, the developer will have to use the <img> tag. The <img> tag allows a user to an image to a webpage.

An example of inserting an image in a webpage is as follows:

<img src=""Annual.gif"" alt=""Annual Day"" height=""40"" width=""40"">

<img src=""Independence.gif"" alt=""Independence Day"" height=""40"" width=""40"">"

5 0
3 years ago
Read 2 more answers
By default, after how much time has elapsed in a client's DHCP lease will the client attempt to renew the lease?
maw [93]
The client will attempt to renew halfway through the time of the lease.
3 0
3 years ago
What is the highest decimal value we can represent with a byte?
RoseWind [281]

Answer:

255 or 11111111

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • 3 Points
    9·2 answers
  • What are 7 good facts on Computer Viruses?
    10·1 answer
  • What type of device is characteristic of an enterprise environment? Question 14 options: a) A workstation used by a retired pers
    7·1 answer
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • During project management, who executes tasks and produces the deliverables as stated in the project plan and as directed by the
    9·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    6·1 answer
  • A site, a domain, or an organizational unit in active directory is referred to as a:____.
    6·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!