1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
4 years ago
6

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine

ss needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?
Computers and Technology
1 answer:
jek_recluse [69]4 years ago
6 0

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

You might be interested in
Adding Web pages helps Web designers ___. Choose all answers that are correct.
ss7ja [257]

Answer:

B

Explanation:

7 0
3 years ago
The domain in an email message tells you the
Alexus [3.1K]
The type of service provider
8 0
3 years ago
What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
nexus9112 [7]

Answer:

There Should be at least 10 Points

Explanation:

An execution graph becomes more powerful as you add more data points because there will be more opportunities to identify patterns. If you are looking for signs of improvement, you usually need at least 10 data points.

Performance charts (frequently acknowledged as line graphs outside the excellence management field) display the performance of the process over time

6 0
3 years ago
6.23 LAB: Convert to binary - functions Instructor note: This is a lab from a previous chapter that now requires the use of a fu
Kitty [74]

Answer:

The program in Python is as follows:

import math

def integer_to_reverse_binary(integer_value):

   remainder = ""

   while integer_value>=1:

       remainder+=str(integer_value % 2)

       integer_value=math.floor(integer_value/2)

   reverse_string(remainder)

def reverse_string(input_string):

   binaryOutput=""

   for i in range(len(input_string)-1,-1,-1):

       binaryOutput = binaryOutput + input_string[i]

   print(binaryOutput)

integer_value = int(input("Enter a Number : "))

integer_to_reverse_binary(integer_value)

Explanation:

This imports the math module

import math

This defines the integer_to_reverse_binary function

def integer_to_reverse_binary(integer_value):

This initializes the remainder to an empty string

   remainder = ""

This loop is repeated while the integer input is greater than or equal to 1

   while integer_value>=1:

This calculates the remainder after the integer value is divided by 2

       remainder+=str(integer_value % 2)

This gets the floor division of the integer input by 2

       integer_value=math.floor(integer_value/2)

This passes the remainder to the reverse_string function

   reverse_string(remainder)

The reverse_string function begins here

def reverse_string(input_string):

This initializes the binaryOutput to an empty string

   binaryOutput=""

This iterates through the input string i.e. the string of the remainders

   for i in range(len(input_string)-1,-1,-1):

This reverses the input string

       binaryOutput = binaryOutput + input_string[i]

This prints the binary output

   print(binaryOutput)

<u>The main begins here</u>

This gets input for integer_value

integer_value = int(input("Enter a Number : "))

This passes the integer value to the integer_to_reverse_binary function

integer_to_reverse_binary(integer_value)

3 0
3 years ago
What is the purpose of the 300 Log?
egoroff_w [7]

Answer:

The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.

Explanation: brainliest plzzzz!

4 0
3 years ago
Other questions:
  • An _________ is a phrase formed from the first letters of words in a set phrase or series of words a. Acronymic sentence c. Basi
    7·2 answers
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • The concept of plug and play" is demonstrated by which of the following
    15·1 answer
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • System software can be described as end-user software and is used to accomplish a variety of tasks.
    12·1 answer
  • Which format is best for the image below?
    12·1 answer
  • shapes polymorphism Create a set of classes derived from an abstract class Shape, which provides a common interface, for managin
    7·1 answer
  • You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
    13·1 answer
  • In order to see what the services status will be in a given runlevel, you would use what command?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!