1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
4 years ago
7

What should you do if you copy a sentence from a book into a document

Computers and Technology
1 answer:
il63 [147K]4 years ago
3 0

Answer:

Your answer is going to be B

You might be interested in
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could be modeled by
ololo11 [35]

Answer:

Explanation: one scenario that can be modeled by computer simulation is weather forecasting like the possibility of it to rain in the next few days

Main advantages of simulation

Study the behavior of a system without building it

Main disadvantages of simulation include:

Expensive to build a simulation model.

6 0
3 years ago
The purpose of font formatting within a search log is to identify key words, important information, and______
Bad White [126]
I believe it would be the letter b, because you are searching for something particular and that provides you with assistance.
6 0
3 years ago
Read 2 more answers
5. Users report that your company's Windows Server 2003 terminal server is experiencing performance issues. You have a performan
timurjin [86]

Question options:

A. a port scanner

B. System Monitor

C. a network analyzer

D. a vulnerability test

Answer:

C. a network analyzer

Explanation:

A network analyzer will provide the network data needed to determine the performance of the server and if there is an attack on the server. Network analyzers track network traffic and collects information on data being transferred on the network. Using network analyzer tools we can be able to troubleshoot network problem if server may be running slow and so determine where an attack may be coming from. Network analyzers can be hardwares or softwares(like solarwinds)

7 0
3 years ago
Which of these are part of the CPU?<br> O peripheral<br> O HDMI cord<br> O core<br> O keyboard
Makovka662 [10]
Hiii I think the best option would be C. Core
7 0
3 years ago
Other questions:
  • A cloud service provider uses the Internet to deliver a computing environment for developing, running, and managing software app
    11·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    7·1 answer
  • What is the name of the popular DBMS (database management system) that is open source and is distributed under the General Publi
    15·1 answer
  • What stylistic device does Reverend Jesse Jackson use in the following statement: "We must relate instead of debate; we must ins
    10·1 answer
  • Which collaboration technology is becoming more and more popular within organizations because it provides a means for forming ad
    12·1 answer
  • Which can be used to enter and manipulate information in a database?<br><br> ANSWER: C) a form
    7·1 answer
  • Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a ca
    6·1 answer
  • Aaron is stating the main idea of what he read in his own words. He is _____.
    11·2 answers
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
  • Which file contains full and incremental back-up information for use with the dump/restore utility?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!