1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
3 years ago
5

How do IT security workers help business

Computers and Technology
1 answer:
Elodia [21]3 years ago
6 0
They code and learn how to go in the inner and deeper parts of the computer
You might be interested in
in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da
MArishka [77]

Answer:

٢٣٤

Explanation:

5 0
3 years ago
Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point
Umnica [9.8K]

Answer:

Data: Data are raw facts and figures that are collected together for analysis. In other words, Simple no processing is data.

Information: Information is the facts provided about something. In simple terms, processed data is information.

Knowledge: Knowledge is the processed facts that are understand for a conclusion.

1. An item's UPC number - data

Explanation: An item number is data because simple no processing is required.

2. Change back to customer - information

Explanation: Data about a customer is information.

3. General changes to demand in different seasons - knowledge

Explanation: Requires data (time and quantity purchased) to be processed/aggregated into information. The information is understood to provide a pattern of demad changes due to seasons.

4. Cost each - data

Explanation: Cost each is data because simple no processing is required.

5. Quantity purchased - data

Explanation: Cost each is data because simple no processing is required.

6. Non-taxable total - information

Explanation: -- requires that data (prices, amounts and whether the item is taxable) to be processed (price * amount for items that are non-taxable).

7. Extended cost [quantity times cost each] - information

Explanation: Extended cost requires processing two pieces of data quantity and cost

8. Amount tendered - data

Explanation: Amount tendered is data because simple no processing is required.

9. Sales of an item for the last week - information

Explanation: Sales of an item for the last week requires aggregating sales for a specific time frame together

10. Upcoming holidays and customer's special needs - knowledge

Explanation: Upcoming holidays and customer's special needs requires holiday data (dates) to be combined with information gathered about customer to understand customer's special needs

11. How paid [cash, charge card, debit card] - data

Explanation: Cost each is data because simple no processing is required.

12. Shopper loyalty card number - data

Explanation: Cost each is data because simple no processing is required.

13. Taxable total - information

Explanation: Taxable total requires that data (prices, amounts and whether the item is taxable) to be processed (price * amount for items that are taxable).

Explanation:

6 0
3 years ago
Overnight Delivery Service delivers a package to Pam. At the request of Overnight's delivery person, to acknowledge receipt Pam
SSSSS [86.1K]

Answer:

Option b (a digitized handwritten signature) would be the right option.

Explanation:

  • Another photograph of such a handwritten signature was used to digitally sign transcripts that would be perceived to have become a "digitized signature."
  • Those same kinds of signature verification may take a glance official, but they don't protect against widespread fraud, a vital component of every other internet signature.

The latter available options weren’t connected to the type of situation in question. So the response above would be the correct one.

3 0
3 years ago
) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
vovikov84 [41]

Answer:

Machine’s IP=126.127.85.170, Machine’s Netmask=/27, Parent’s Netmask=255.255.240.0 .

a) Machine's Netmask = /27 : therefore no. of remaining bits for hosts =32-27 = 5 bits.

b) No. of usable addresses in the child network = 25 -2 = 32-2 =30 [Since first(network ID of the machine) and last ip (broadcast address of the machine ) addresses are not used ]

c) first usable address is on this child network (subnet) =

First, find out the network id of machine can be found out by doing bitwise AND machine's IP and Machine's subnet mask :

01111110. 01111111.01010101.10101010 (IP)

11111111. 11111111 .11111111 .11100000 (Subnet Mask)

01111110. 01111111. 01010101.10100000 (Network ID )

first usable address is on this child network (subnet) :   01111110. 01111111. 01010101.10100001

: 126.127.85.161

d) what the last usable address is on this child network (subnet) :  01111110. 01111111. 01010101.10111110

: 126.127.85.190

e) what the child network’s (subnet's) broadcast address is :

In the directed broadcast address , all the host bits are 1. Therefore, broadcast address :

01111110. 01111111. 01010101.10111111 (126.127.85.191)

f) what the child network's (subnet's) network number is : Network ID has already been calcuulated in part c .

01111110. 01111111. 01010101.10100000 (126.127.85.160)

6 0
3 years ago
OSHA requires training for employees on the hazards to which they will be exposed.
Sedaia [141]

A, OSHA does require training for employees on the hazards to which they will be exposed.


3 0
4 years ago
Read 2 more answers
Other questions:
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • What do the letters of the su command stand for? what can you do with su besides give yourself root privileges? "what can you do
    5·1 answer
  • Please describe in a few sentences
    14·1 answer
  • write a c++ program that writes weather data from a file wx_data.txt to a file wx_summary for everyday of the year. also add min
    15·1 answer
  • Primary technology skills are skills that are necessary for success in online education
    9·2 answers
  • Why is data processing done in computer?​
    14·1 answer
  • How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural lang
    13·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!