1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
4 years ago
10

Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers

the amount and impact of unintentional errors that are entering the system?
Computers and Technology
1 answer:
Degger [83]4 years ago
5 0

Answer:

The correct answer is Preventative controls.

Explanation:

Preventive Controls: Anticipate unwanted events before they happen.

  • They are more profitable
  • They must be incorporated into the systems
  • Avoid correction or reprocessing costs

Example: Security software that prevents access to unauthorized personnel, to try to prevent the production of errors or fraudulent events.

You might be interested in
The first window displayed when you install opensuse is the ____ window.
Jlenok [28]
Is the <span>Boot Options window.</span>
3 0
3 years ago
What is the output, if userVal is 5? int x; x = 100; if (userVal != 0) { int tmpVal; tmpVal = x / userVal; System.out.print(tmpV
spayn [35]

Answer:

The output is 20

Explanation:

This line divides the value of x by userVal

tmpVal = x / userVal;

i.e.

tmpVal = 100/5

tmpVal = 20

This line then prints the value of tmpVal

System.out.print(tmpVal);

i.e 20

Hence, The output is 20

4 0
3 years ago
An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
Nataliya [291]

Answer:

D1= 60 HOSTS

network address - 200.120.80.64/26

subnet mask -255.255.255.192/26

D2 = 90 HOSTS

network address - 200.120.80.0/25

subnet mask -255.255.255.128/25

D3 = 90 HOSTS

network address - 200.120.80.128/25

subnet mask -255.255.255.128/25

5 0
4 years ago
Write a Perl program to accomplish each of the following on the file solar.txt (see link at the class homepage) 1. Print all rec
ryzh [129]

Answer:

see explaination

Explanation:

use strict;

use warnings;

my $filename = 'data.txt';

open(my $fh, '<:encoding(UTF-8)', $filename)

or die "Could not open file '$filename' $!";

while (my $row = <$fh>) { //Q1

chomp $row;

atfields = split(/:/, $row);

if($fields[7] eq "?" || $fields[7] eq NULL)

print "$row\n";

}

while (my $row = <$fh>) { //Q2

chomp $row;

atfields = split(/:/, $row);

print '$fields: ' , replace($fields[1],"",$fields[1]) , "\n";}

}

while (my $row = <$fh>) { //Q3

chomp $row;

atfields = split(/:/, $row);

if (index($fields[2], "-") != -1) { //Looking out for negative sign in the field

print "$row\n";

}

while (my $row = <$fh>) { //Q4

chomp $row;

atfields = split(/:/, $row);

if($fields[7] eq "Voyager2")

print "$row\n";

}

Note: replace at anywhere in the program with the at symbol

8 0
3 years ago
The clock interrupt handler on a certain computer requires 2ms (including process switching overhead) per clock tick. The clock
salantis [7]

Considering the situation described above, the fraction of the CPU execution that is devoted to handling clock interrupts "<u>12 percent</u>."

<h3>CPU Execution process.</h3>

The process of CPU Execution involves the execution of an instruction which in life fetches an instruction from memory through its ALU to carry out an operation and then saves the result to memory.

To illustrate the fraction of the CPU execution that is devoted to handling clock interrupts, we have:

60 × 2 msec = 120 msec ÷ 1 sec = 12 percent.

Hence, in this case, it is concluded that the correct answer is <u>12 percent CPU</u> devoted to the clock.

Learn more about the CPU execution here: brainly.com/question/14400616

4 0
3 years ago
Other questions:
  • Which signal types are represented by a continuous waveform?
    10·1 answer
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    5·1 answer
  • What systemctl command configures a unit to start the next time the computer boots?
    10·1 answer
  • What is wrong with this line of python code
    9·1 answer
  • _____ is a predefined format used for text the can include multiple font formatting features
    13·1 answer
  • What is the difference between a Yahoo! and Yippy!?\
    12·1 answer
  • Trish has bought a new computer that she plans to start on after a week
    5·1 answer
  • What is the difference between second generation and third generation​
    15·1 answer
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!