1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
13

Which of the following is a list of input devices?

Computers and Technology
2 answers:
Kobotan [32]3 years ago
4 0
C, microphone, mouse scanner all send inputs to the system :)
sammy [17]3 years ago
3 0
C is the correct answer I think.
You might be interested in
Is the following statement true or false? The message you send, the message you intend to
ExtremeBDS [4]

Answer:

False

Explanation:

Communication between people consistently becomes misconstrued. Our intentions are not known until made very clear.

3 0
2 years ago
Explain how applying different network topologies could have an impact on the security of a network
nika2105 [10]

Answer:

More open

Explanation:

Hackers could get in easier

4 0
3 years ago
-Give a definition of the critical section problem and explain the purpose of the entry and exit code blocks
Alisiya [41]

Answer: In operating system a code segment which accesses  some shared variables or resources one at a time atomically such other no other code or process is accessing that resource or variable at the same time.

Entry section code block allows the access to the shared resource or variable and exit section code signals the termination from access to the shared resource or variable.

Explanation:

Entry and exit section codes needs to check certain properties before allowing the access and removal of access to a particular code segment.

These conditions are:

1. Bounded waiting.

2. Mutual exclusion.

3. checking thread execution status to allows other threads to enter the critical section (CS).

6 0
3 years ago
Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
madreJ [45]

Answer:

129 \frac{2}{?} 23.4. \div 164 \times 5y1 + . \\ .00487ggh

6 0
3 years ago
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
Other questions:
  • Which protocol would you utilize to upload files to a web server?
    14·1 answer
  • How would you determine if your earned credits would transfer to a regionally accredited school?
    14·2 answers
  • What type of engineering drawing use symbols to represent components drawings
    6·1 answer
  • Web Services: a. Is a hardware application b. Is a software application c. Is an enterprise system d. Is a single database
    11·1 answer
  • Next, Jamal wants to copy text from a Word document to the slide he just added. He outlines the steps to complete his task. Step
    15·2 answers
  • When drawing multiple objects on the same slide they cannot overlap<br> true<br> false
    8·2 answers
  • Discuss the challenges of not using the five elements of multimedia in a positive manner<br>​
    7·1 answer
  • Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets y
    15·1 answer
  • Click print to publish your post in a blog true or false.​
    5·2 answers
  • Please help me with this question<br>it on the picture​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!