1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
8

Take the hypothetical situation that your business is considering a move to the cloud for core systems that contain confidential

health and financial information. Understandably, the business leaders are very concerned about the security of data. Your assignment is to write a proposal for how to mitigate the security concerns. Be specific in your proposed solutions.
Computers and Technology
1 answer:
zvonat [6]3 years ago
8 0

Answer:

Solutions: to have a non-related to the company account and a back-up system.

Explanation:

My proposal is to move all the information of the bussiness to the cloud for better use of the data.

This data contains confidential health and finantial information and, in order to avoid any information non-wanted exit, the account has to be completing separated from the bussiness name  (more accounts),  by this way, it will be harder for extserns to get in it and substract the confidential information.

Also, the account must have a series of  security blocks to make it harder to  enter.

Finally, in case a virus gets in it and deletes any information, the data must have a backup system that will provide all the needed information in case it goes missing.

You might be interested in
Explain what LIFO and FIFO mean, and how they are used in Abstract data types?
Dimas [21]

Answer:

LIFO stands for Last In First Out. This procedure is used in the Stacks in data structures.Stacks are the data types in which the data is stored called Stack.

Explanation:

8 0
3 years ago
A ________ is a computer or other electronic device connected to a network
Tanzania [10]
A _node_ is a computer or other electronic device connected to a network.

With the _mesh_ network topology, reliability is the major advantage while high cost is the disadvantage.
8 0
3 years ago
This list represents the horses leading in a race: leadHorses ← ["Justify", "Bravazo", "Good Magic", "Tenfold", "Lone Sailor", "
IrinaVladis [17]

Answer:

leadHorses ← ["Justify", "Bravazo", "Good Magic", "Lone Sailor", "Tenfold",  "Sporting Chance", "Diamond King", "Quip"]

Explanation:

leadHorses ← ["Justify", "Bravazo", "Good Magic", "Tenfold", "Lone Sailor", "Sporting Chance", "Diamond King", "Quip"]

tempHorse ← leadHorses[3]

tempHorse ← Tenfold

leadHorses[3] ← leadHorses[4]

leadHorses[3] ← Lone Sailor

leadHorses[4] ← tempHorse

leadHorses[4] ← Tenfold

leadHorses ← ["Justify", "Bravazo", "Good Magic", "Lone Sailor", "Tenfold",  "Sporting Chance", "Diamond King", "Quip"]

Tenfold and Lone Sailor swap positions.

5 0
3 years ago
This algorithm works by selecting the smallest unsorted item in the list and then swapping it with the item in the next position
Juliette [100K]

Answer:

a) Bubble sort

Explanation:

Bubble sort is a type of sorting algorithm that swaps small value with a bigger value over a number of rounds called pass.

5 0
3 years ago
The part of the computer that provides acess to the internet is called?
Eva8 [605]

<u>Answer:</u>

<em> </em><em>Modem is an hybrid device,</em><em> which is responsible for modulating and demodulating information. </em><em>It is a transmission medium and also it is a hardware tool used for connecting to internet.</em>

<u>Explanation:</u>

What is modulation?, let us understand. The <em>process of converting analog to digital signal is called modulation and demodulation is vice-versa.</em> The computer connects internet classically using telephone wire.

The <em>telephone wire understands only analog signal and a computer understands only digital signal.</em> So Modem’s role is to take care of this aspect while <em>connecting to the internet.</em>

3 0
3 years ago
Other questions:
  • Open Source software is:
    6·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • An organization that operates a small web-based photo backup business is evaluating single points of failure. The organization h
    7·1 answer
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • Let's say that you want to create a new Integer array with a size of 56. Pick the array that would accomplish this:
    14·1 answer
  • How to allow all users to access a program?
    12·1 answer
  • Most Muslims are Sunni Muslims; however, the Shiites are a forceful minority in some parts of the Middle East. The Sunni-Shiite
    13·1 answer
  • In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
    7·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!