1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
4 years ago
15

Can anybody answer this for me ?

Computers and Technology
1 answer:
VARVARA [1.3K]4 years ago
4 0

how about this asset assessment, threat assessment, vulnerability assessment, risk step determines the value of each asset and prioritizes the asset based upon the would have grave consequences resulting in loss of life, serious injury, or mission How will exploiting or harming U.S. assets bring the adversaries closer to their company

hope me and sans helped :-)

You might be interested in
What is the value of the variable result after these lines of code are executed?
Crank

Answer:

18

Explanation:

If you take the formula, and you substitute the values of the variables, it will be:

    10 * 2 - 10 / 5

Then if you remember the order of math operations, it will be:

    (10 * 2) - (10 / 5)

Which reduces to:

    20 - 2 = 18

4 0
3 years ago
Which of the following internet connection types is known to have a significantly higher latency than the others
Degger [83]
What are the options?
7 0
4 years ago
How is social media changing the world as we know it?
Alisiya [41]

Answer:

Explanation:

Social media is making it easier to make a lot of noise about a pressing issue in society, such as human rights violations.

I use social media because I want to keep tabs on people I know.

A change in social media is that people have become increasingly overreliant on it. We tend to spend increasing amounts of time on social media.

Social media should be INFORMATIVE about presidential elections, and it should not be used to spread baseless information. This way, people are more informed about the facts of the candidates and their platforms.

Social media has paved the way for me to make new relationships to important people in my life.

Social media does pose a threat to family and leisure time when said family members tend to be overreliant on the phones and ignore those around them.

The person who is addicted to social media is myself because I spend several hours on it everyday— and that much interaction is too much because it should be one hour a day at most.

I have experienced cyberbullying; the solution to this problem is accountability and finding those who instigate it to bring them to justice.

3 0
3 years ago
Select the most likely outcome of making only on-time minimum payments to a credit
Serjik [45]
The answer is B. Your will have gone mostly towards paying interest and you will still owe the majority of the balance that you had from ago
4 0
4 years ago
HW7.24. Return nth integer from CSV string The function below takes two parameters: a string parameter: CSV_string and an intege
kotykmax [81]

Answer:

The solution code is written in Python 3.

  1. def processCSV(CSV_string, index):
  2.    data = CSV_string.split(",")
  3.    result = data[index]
  4.    return int(result)
  5. processCSV('111,22,3333,4', 2)

Explanation:

Firstly, create function and name it as <em>processCSV()</em> with two parameters, <em>CSV_string</em> and <em>index</em> (Line 1).

Since the CSV_string is a collection of integers separated by comma, we can make use of Python String built-in method <em>split() </em>to convert the <em>CSV_string </em>into a list of numbers by using "," as separator (Line 2).

Next, we can use the <em>index</em> to extract the target value from the list (Line 3).

Since the value in the list is still a string and therefore we shall use Python built-in method int() to convert the target value from string type to integer and return it as output of the function (Line 4)

We can test our function by using the sample test case (Line 6) and we shall see the expected output: 3333.

8 0
3 years ago
Other questions:
  • Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
    14·1 answer
  • In a pinhole camera, the image seen in the camera will be inverted<br><br> true<br> false
    13·2 answers
  • Which of these are examples of skills?
    5·2 answers
  • The government department responsible for laws concerning work is the
    12·1 answer
  • Changes in computer technology have an effect on _____. computer scientists only people who work with computers only everybody p
    12·2 answers
  • When you search google for​ dishwashers, you are likely to see a number of inconspicuous ads for​ advertisers, including product
    11·1 answer
  • Computer programs and games are called what?
    13·1 answer
  • A DBMS makes the: a. relational database available for different analytical views. b. physical database available for different
    12·1 answer
  • As an IT specialist you are asked to troubleshoot a problem with two
    14·2 answers
  • What happens when a user clicks Accept on a meeting request?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!