1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
13

In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimate

d 40 million customers at risk. In 2009, the health care provider BlueCross BlueShield of Tennessee suffered a theft of hard drives when it reported 57 hard drives stolen. Both these cases resulted from a(n) ________________ failure
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
4 0

Answer:

Security Policies

Explanation:

As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.

You might be interested in
Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
victus00 [196]

Answer:

following are the program to the given question:

Program:

x = 0#defining an integer variable that holds a value

if x < 0:#defining if that checks x less than 0

   print("This number ",  x, " is negative.")#print value with the message

else:#defining else block

   if x > 0:#defining if that checks x value greater than 0

       print(x, " is positive")#print value with message

   else:#defining else block

       print(x, " is 0")#print value with message

if x < 0:#defining another if that checks x less than 0

   print("This number ",  x, " is negative.")

elif (x > 0):#defining elif block that check x value greater than 0

   print(x, " is positive")#print value with message

else:#defining else block

   print(x, " is 0")#print value with message

Output:

Please find the attachment file.

Explanation:

In this code, an x variable is defined which holds a value that is "0", in the next step nested conditional statement has used that checks the x variable value and uses the print method that compares the value and prints its value with the message.

In another conditional statement, it uses if that checks x value less than 0 and print value with the negative message.

In the elif block, it checks x value that is greater than 0 and prints the value with the positive message, and in the else block it will print the message that is 0.

3 0
4 years ago
When a hostname is configured through the cisco cli, which three naming conventions are part of the guidelines? (choose three.)?
Advocard [28]
When a hostname is configured through the Cisco cli,  there are some naming <span>conventions are part of the guidelines that should be followed.

From these conventions:
1- the name of the host shouldn't contain any spaces.
2- the name of the host should always begin with a letter
3- the name of the host should be less than 64 characters in length.</span>
3 0
4 years ago
Which is an unbound form with menu options for navigating a database?
Shalnov [3]
The unbound form with menu options for navigating a database is B. a switchboard
An unbound form does not contain a RecordSource, that does not mean it cannot have data, but the programmer will have to bring that data in manually, where a bound form is automatically associated with some data.
4 0
3 years ago
which of the following is one way that developers and organizations who produce open-source software can generate revenue from t
BlackZzzverrR [31]

The option that is one way that developers and organizations who produce open-source software can generate revenue from the software is option B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

<h3>What is the revenue generation about?</h3>

Although it is not particularly popular, charging people for open source software is a possibility. Paid support contracts are already permitted by some businesses, such as Red Hat, which helps to support the business model and keep the programmers employed.

It is feasible to demand a predetermined payment in exchange for access to your open source code.

Therefore, one option to make money is to ask for paid support or a one-time fee for access to an open source project or piece of code.

Even if you will get ROI right away if you demand paid support from your open source provider, there are numerous potential disadvantages and drawbacks that could prevent you from realizing the full potential of the open source software or solution you choose.

Learn more about open-source software from

brainly.com/question/28905225
#SPJ1

See full question below

which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software?

A. The source code for open source software may be modified and redistributed, provided it is priced reasonably and part of the proceeds is contributed to the Linux Foundation.

B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

C. The vast majority of people who work on efforts like Linux are now paid to do so by non-profit organizations such as the Linux foundation.

D. Major hardware firms no longer employ paid staff contributing to open source projects.

E. Open source software is available for anyone to download from the Internet, but the code should not be modified.

B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

8 0
2 years ago
A brief communication used in businesses is called a _____.
Bad White [126]

Answer:

C. Memo

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
    8·1 answer
  • One of the disadvantages of Audacity is that it has limited technical support since it is a free program.     true or false
    11·2 answers
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • Justify the statement "The same job title can have different job roles and different qualification criteria in different organiz
    7·1 answer
  • Which of these is an example of open-source software?
    13·1 answer
  • What is the protocol developed for the wireless network communications? explain?
    8·1 answer
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • to see additional functions available in an open desktop, document or website what action should the user perform?
    11·2 answers
  • What will happend when I got a BSOD in Windows?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!