1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
3 years ago
15

What are the six critical components of an information system? Select three of the six components, and describe a potential vuln

erability inherent with that component. Also describe what a threat agent might do to exploit that vulnerability.
Computers and Technology
1 answer:
Blizzard [7]3 years ago
7 0
People, procedures and instructions, data, software, information technology infrastructure, internal controls.
You might be interested in
How to set a prperty to all intems in array c#
Katena32 [7]
Try looking at this site, <span>www.c-sharpcorner.com/article/working-with-arrays-in-C-Sharp/</span>
6 0
3 years ago
What is the difference between 1080p and 2k?
professor190 [17]
They have the same  vertical resolution. I can suggest you to watch the video in youtube .<span>https://www.youtube.com/watch?v=uluEEGBHyUE</span>
7 0
3 years ago
The CEO of your small company has asked you to connect his laptop computer to the small conference room LED TV. The CEO will be
baherus [9]

Answer:

HDMI

Explanation:

HDMI is high definition media interface.Its is a loss less media interface. It is used to transfer audio and video data at the same time with high bandwidth capacity.High bandwidth and speed ensures high quality audio and video transmission.It is able to carry 10 bit video signal to provide better video quality.It supports multiple audio and video format.

3 0
4 years ago
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
jonny [76]

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

3 0
3 years ago
A. Carly’s Catering provides meals for parties and special events. In Chapter 3, you created an Event class for the company. The
Tpy6a [65]

Answer:

import java.util.Scanner;

public class Event {

  public final static double LOWER = 32.00;

  public final static double HIGHER = 35.00;

  public final static int CUTOFF_VALUE = 50;

  public boolean largeEvent;

  private String eventNum;

  private int totalGuests;

  private double price;

  private double pricePerGuest;

  public Event(String event, int guests) {

      eventNum = event;

      totalGuests = guests;

  }

  public Event() {

      this("A000", 0);

  }

  private Scanner input = new Scanner(System.in);

  public void setEventNumber() {

      System.out.print("Enter the event number? ");

      eventNum = input.nextLine();

  }

  public void settotalGuests() {

      System.out.print("Enter total guests that are attending the event? ");

      totalGuests = input.nextInt();

      if (isLargeEvent())

          pricePerGuest = LOWER;

      else

          pricePerGuest = HIGHER;

      price = totalGuests * pricePerGuest;

      largeEvent = (totalGuests >= CUTOFF_VALUE);

      System.out.println("");

  }

  public boolean isLargeEvent() {

      if (this.gettotalGuests() > 50)

          return true;

      else

          return false;

  }

  public String getEventNumber() {

      return eventNum;

  }

  public int gettotalGuests() {

      return totalGuests;

  }

  public double getPrice() {

      return price;

  }

}

public class EventDemo {

  public static void main(String[] args) {

      Event event1 = new Event();

      Event event2 = new Event();

      Event event3 = new Event();

      System.out.println("Enter Details of event1:");

      event1.setEventNumber();

      event1.settotalGuests();

      System.out.println("Enter Details of event2:");

      event2.setEventNumber();

      event2.settotalGuests();

      System.out.println("Enter Details of event3:");

      event3.setEventNumber();

      event3.settotalGuests();

      display(event1);

      display(event2);

      display(event3);

      System.out.println("Get largest event from event1 and event2 is :");

      display(getLargestEvent(event1, event2));

      System.out.println("Get largest event from event2 and event3 is :");

      display(getLargestEvent(event2, event3));

      System.out.println("Get largest event from event1 and event3 is :");

      display(getLargestEvent(event1, event3));

  }

  public static void display(Event e) {

      System.out.println("Event number: " + e.getEventNumber());

      System.out.println("Total guests: " + e.gettotalGuests());

      System.out.println("Total price: $"

              + String.format("%.2f", e.getPrice()));

      System.out.println("Is Large event: " + e.isLargeEvent());

      System.out.println("");

  }

  public static Event getLargestEvent(Event e1, Event e2) {

      if (e1.gettotalGuests() > e2.gettotalGuests())

          return e1;

      else

          return e2;

  }

}

Explanation:

  • Call isLargeEvent() method to check whether to set pricePerGuest as Lower or Higher.
  • Calculate the price by multiplying the total guests with price per guest.
  • Call gettotalGuests() method to check if the event is large or small.
5 0
3 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num
    13·1 answer
  • How do you open two different picture in photoshop?
    14·1 answer
  • Instructions:Select the correct answer.
    9·2 answers
  • Which state legislation requires companies to report security breaches within 48 hours
    6·1 answer
  • Pen registers and trap-and-trace devices are not considered forms of searches and do not need probable cause and a court order b
    10·1 answer
  • Anyone tell my answer.
    15·1 answer
  • ## Inputs
    15·1 answer
  • A company set up controls to allow only a specific set of software and tools to install on workstations. A user navigates to a s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!