1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
7

A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi

de justification for the request. What three reasons can the user use to justify the request?
Computers and Technology
1 answer:
RoseWind [281]3 years ago
5 0

Answer:

1. The ability to control when updates occur

2. The ability to obtain reports on systems

3. No opportunities for users to circumvent updates

Explanation:

To understand patch management, one needs to understand first what a patch is. A patch is simply a piece of code that improves a program already installed into your system. They are created to correct issues in an already-released program when a bug is discovered without the need to re-create the program altogether. Patch management is therefore the process of installing (and managing) the latest patches - code changes which improve the system or fix security vulnerabilities — on various systems within a network.

Based on the objective of the patch management as defined above, the user can streamline his justification for the request with the below three reasons:

1. The ability to control when updates occur

2. The ability to obtain reports on systems

3. No opportunities for users to circumvent updates

You might be interested in
Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
Nezavi [6.7K]

Answer:

you suck

Explanation:

5 0
3 years ago
What are three ways digital identity is created and kept up? (open answer)
Anna007 [38]

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

6 0
2 years ago
Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
Oduvanchick [21]
She can hit always replace

7 0
3 years ago
Read 2 more answers
Which program will have the output shown below?
Nutka1998 [239]

Answer: Python

Explanation: All I know is that the programming language is Python.

8 0
2 years ago
Read 2 more answers
Write a program that checks whether a positive number given by an input from the user is greater than 5 and less than 20 with ja
Alona [7]

Answer:

Program written in Java is as follows

See comments for explanations

import java.util.Scanner;

public class CheckRange {

public static void main (String [] args)

{

// This line allows the program accept user input

Scanner input = new Scanner(System.in);

//This line declares variable for user input

int num;

//This line prompts user for input

System.out.print("Number: ");

//This line gets user input

num = input.nextInt();

/* The following if statement checks if the user input is greater than 5 and less than 20 */

if (num > 5 && num <= 20)

{

/* This line is executed if the above condition is true */

System.out.print(num+" is greater than 5 and less than 20");

}

else

{

/*If the condition is not true, this line is executed*/

System.out.print(num+" is not within specified range");

}

// The if condition ends here

}

}

5 0
3 years ago
Other questions:
  • Paul is the web page designer for his company. Paul’s boss tells him that customers have been complaining that it is difficult t
    8·2 answers
  • If you know the unit prices of two different brands of an item you are better able to
    8·1 answer
  • Which is a function of network media?
    14·2 answers
  • Which of the following is 1000 of a second​
    15·1 answer
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • .Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
    5·2 answers
  • Write an algorithm to find the average of three numbers: 10, 20, 30
    7·1 answer
  • Hot components or sharp edges of computer is an example of what hazard​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!