1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
13

Is the IOT governable by frameworks? Explain your rationale.

Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

You might be interested in
Consider the following code segment. for (int a = 0; a < 10; a++) { for (int b = 10; b > a; b--) { System.out.print("#");
Ket [755]

Answer:

55

Explanation:

Given the codes as below:

  1.        for (int a = 0; a < 10; a++)
  2.        {
  3.            for (int b = 10; b > a; b--)
  4.            {
  5.                System.out.print("#");
  6.            }
  7.        }

There are two layer loops in the code. The outer loop (Line 1) will run for 10 iterations by traversing through a = 0 to a=9. However, the inner loop  (Line 3) will run for 10 + 9 +  8 + 7 +...+ 1 = 55 iterations.

Since the print statement is within the inner loop (Line 5) and therefore the number of printed "#" symbols is dependent on the number of iterations of the inner loop. There will be 55 "#" symbols printed.

6 0
4 years ago
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the
serious [3.7K]

Answer:

11: Compiler translates a high level source program into a target equivalent (machine language).

An interpreter implements a virtual machine, the high-level programming language of which is the "machine language." The interpreter reads statements more or less one at a time in that language, and executes them as they go along.

12: One could also consider Java either. A compiler (complicated translator) can create code, which is then executed by a complicated virtual machine (interpreter)

13: A preprocessor is an initial translator which removes comments and white space, and group characters together into tokens such as keywords, identifiers, numbers, and symbols, as well as simple syntactic structure analyses. A compiler uses in-depth analysis and nontrivial transformation.

14: C++ implementations based on the early AT&T compiler created an intermediate program in C rather than assembly language

15: Stack-based language, similar to modern Java compiler byte code

16: A method in which a simple interpreter implementation evolves into building more complex versions until the compiler is built.

17: A compiler which translates byte code into machine language immediately prior to each program execution.

18: Lisp and Prolog

19: TEX and TROFF are one of such compilers that translate high-level document descriptions into laser printer or phototypesetter commands. Query language processors for database systems are also compilers that translate languages such as SQL into primitive file operations.

21: without havin to call multiple tools with command-line tools, You can write an entire program in an IDE.

8 0
3 years ago
What are invoices? A. Documents that convey a company's liabilities B. Documents that convey how much a company was earning and
grandymaker [24]
<span>C. Documents that convey buyers, sellers, and purchases made</span>
5 0
3 years ago
Read 2 more answers
What is the difference between spyware and adware?
Sati [7]

Answer:

It's C

Explanation:

Adware displays or directs the users to an advertisement, while spyware performs espionage on the computer`s activity.

8 0
3 years ago
Read 2 more answers
Other questions:
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    10·2 answers
  • Your friend sends you a photograph of his son. you want to enlarge the photograph. which program type will you use to make this
    15·1 answer
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • Write a program that reads a target string from the keyboard and then another sentence string from the keyboard.
    10·1 answer
  • Kiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purcha
    15·2 answers
  • Which line of code will eliminate the element “calculator” from an array of supplies?
    13·1 answer
  • PLZZZZZ help will give brainleist <br> Two common sound files are?
    11·1 answer
  • How to fix a blue screen
    9·2 answers
  • What the difference between an operating system drive and a storage drive?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!