1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
9

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security ________.
Computers and Technology
2 answers:
melamori03 [73]3 years ago
8 0

Answer:

The answer is blueprint.

Refer below for explanation.

Explanation:

Blueprint ia a guide that is made for something else, so it was originally made to copy.

Alika [10]3 years ago
3 0

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

You might be interested in
Intellectual property rights are exclusive rights that help protect both the created and the creation. IPR offers exclusively wh
dedylja [7]
IPR offers ownership of the intellectual property. The owner of the property has the right to a monetary gain from those who wish to use it.
8 0
3 years ago
Read 2 more answers
A lot of computations involve processing a string one character at a time. Often they start
dedylja [7]

Answer:

The last character in the string processed is "t".

Explanation:

The index start from 0 and the len(fruit) is 5.

When index is 0 which is less than 5; "f" is printed

When index is 1 which is less than 5; "r" is printed

When index is 2 which is less than 5; "u" is printed

When index is 3 which is less than 5; "i" is printed

When index is 4 which is less than 5; "t" is printed

When index is 5, the condition is false; so the loop content is not executed.

Therefore, the last character traversed in the string "fruit" is "t".

3 0
3 years ago
Which of the following is true about ethical issues in graphic design?
Basile [38]

Answer: The Answer Is B

Explanation:

I Did It On Edge

3 0
3 years ago
Read 2 more answers
30points for help
stealth61 [152]

Answer:

blank 4

Explanation:

I just did this assignment got 100

4 0
3 years ago
What is the value of: 1 + int(3.5) / 2?<br> Select one:<br> a. 2<br> b. 2.25<br> C. 2.5<br> d. 3
Drupady [299]

Answer:

C (2.5)

Explanation:

int(3.5) = 3

So, using order of operations, (3/2)+1=2.5

8 0
3 years ago
Other questions:
  • Please explain external hashing, B-trees, and traversals. 3-5 sentences per
    8·1 answer
  • An embedded os must be developed specifically for use with embedded systems. true or false?
    6·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?A. From the Review tab, choose Highlight text and then pres
    7·2 answers
  • The machine should not be oiled until the
    11·1 answer
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    14·2 answers
  • Write a method that takes two circles, and returns the sum of the areas of the circles.
    10·1 answer
  • Date
    6·1 answer
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!