1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
9

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security ________.
Computers and Technology
2 answers:
melamori03 [73]3 years ago
8 0

Answer:

The answer is blueprint.

Refer below for explanation.

Explanation:

Blueprint ia a guide that is made for something else, so it was originally made to copy.

Alika [10]3 years ago
3 0

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

You might be interested in
Match each of the following steps of SDLC development to its position in the development process.
Arisa [49]

Answer:

Step One - problem/opportunity identification  (V)

Step Two - Analysis (III)

Step Three - Design (II)

Step Four - Development (I)

Step Five - Testing and Installation (IV)

Explanation:

In the field of software development, or systems engineering, SDLC which refers to software development cycle refers to a systematic way of building software applications, it shows unique stages with the outcome of each stage dependent on the previous, step has a unique task which range from the planning, analysis, development, testing and installation of the information system.

5 0
3 years ago
wo non-negative integers x and y are equal if either: Both are 0, or x-1 and y-1 are equal Write a function named equals that re
Mrac [35]

Answer:

Using python programming language.

Explanation:

#to define the function write as below

def equal():

    #to get the two integers from the user

#The user is asked for input in the code below.

x = int(input("Enter the value for X"))

y= int(input("Enter the value for y"))

if x==0 and y==0:

    print("both numbers are ", "0")

elif: x==1 and y==1:  #This test if both x and y are 1

    print("true")

elif: x==y: #this line test if both values are equal

    print("true")

else:

    print("False")

equal()  #end of the function

3 0
3 years ago
Guys, it took me 3 seconds to get banned on brainly, try to beat that, actually don't, unless you don't care about your account
Anarel [89]

How did u get banned?

Explanation:

6 0
3 years ago
Read 2 more answers
Smartphones use ________ technology, allowing users to perform several functions with one device. group of answer choices embedd
12345 [234]

Smartphones use <u>convergence or integration</u> technology, allowing users to perform several functions with one device.

<h3>What are smartphones?</h3>

Smartphones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different software applications, functions and perform tasks with the aid of software applications such as web browsers, multimedia player, etc.

<h3>Types of smartphones.</h3>

In Computer technology, there are three popular types of mobile devices and these include the following:

  • Handheld computers
  • Personal digital assistants (PDAs)
  • Smartphones.

In Computer technology, smartphones are designed and developed to use <u>convergence or integration</u> technology by combining previously unrelated technologies together, in order to allow end users perform several functions with one device.

Read more on smart phones here: brainly.com/question/15867542

#SPJ1

8 0
2 years ago
An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chose
boyakko [2]

Answer:

An internal schema                                                            

Explanation:

  • The internal schema refers to the physical storage structure of database.
  • It refers to the lowest level of abstraction.
  • This is also called physical schema.
  • It contains multiple instances of multiple internal records.
  • It provides information about the representation of the whole database that what data is stored in DB and in what form e.g the data is stored in the records form on the disk.
  • This schema gives detailed description of internal model which involves storage structure of the database, representation and classification of stored data. This format of data is only understandable by the Database management system.
7 0
3 years ago
Other questions:
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • In the mouse properties Window, you Can
    6·1 answer
  • (Best Buy Part A) At a Best Buy store, the forecast for the annual demand of a Motorola cell phone is 15600. Demand forecasts ar
    12·1 answer
  • What is WEB 1.0 to WEB3.0
    11·1 answer
  • A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
    14·1 answer
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • Who has pad let and wants to talk
    15·2 answers
  • What power points feature will you use to apply motion effects to different objects of a slide
    5·1 answer
  • Mathematics and computer science share many concepts, such as recursion.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!