1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
7

What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m

ake up the network defense implementation of the banks' networks.
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
4 0

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

You might be interested in
my internet is really slow. i've tried rebooting my computer, erasing history, etc. how can i fix this problem?
Bingel [31]
Did u shut it down and then reset it????? Did you unplug your internet adapter????
3 0
4 years ago
Read 2 more answers
Screen reader software is an example of a(n) ____.
s2008m [1.1K]
<span>It is an example of an assistive output device. These are an example of assistive technology, which is any technology optimized to help the user mitigate the aspects of a disability. This may enable them to use the technology as intended, or it may also assist them in functioning in their everyday lives.</span>
3 0
3 years ago
The following code is poorly structured. Rewrite it so that it has a better structure and avoids redundancy. To help eliminate r
Virty [35]

Answer:

Explanation:

public static void main(String[] args) {

       Scanner console = new Scanner(System.in);

       spending(console,"John");  //calling spending method with "John"

       spending(console,"Jane");  //calling spending method with "Jane"

   }

   public static void spending(Scanner console, String name){

       System.out.print("How much will "+name+" be spending? ");

       double amount = console.nextDouble();

       System.out.println();

       int numBill = (int) (amount / 20.0);

       if (numBill * 20.0 < amount) {

           numBill++;

       }

       System.out.println("John needs " + numBill + " bills");

   }

Code Explanation

Method are reusable set of code which reduces redundancy. So the original code was trying to calculate the bill for John and Jane but the code to calculate was redundant which will cause more line of code and complex to manage. For example let say if we have 1000 of user to calculate there bill, will it be efficient to write bill calculation code for all 1000 users?

That's where function comes in to reduce redundancy from code and easy to manage.

Easy to Manage in a way, let say you need to change the bill calculation formula then without function, you have to change the formula for all the users but with function you only need to change the bill calculation formula in spending function.

7 0
4 years ago
What type of data can be entered into a electronic spreadsheet
Hunter-Best [27]

Answer:  Labels (text) are descriptive pieces of information, such as names, months, or other identifying statistics, and they usually include alphabetic characters.

Values (numbers) are generally raw numbers or dates.

Explanation: Google.!

3 0
3 years ago
What are the advantages and disadvantages of it?
Sholpan [36]
What is the question?
3 0
3 years ago
Other questions:
  • Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
    15·1 answer
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • Laser printers are particularly effective for printing _______________.
    6·1 answer
  • 9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a
    9·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    10·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le
    14·1 answer
  • We can save our data peremently on a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!