1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
11

Data driven processes: Select one: a. are heavily based on intuition b. rely heavily on the experience of the process owners c.

are based on statistical data, measurement and metrics d. do NOT rely on mathematical models
Computers and Technology
1 answer:
krek1111 [17]3 years ago
6 0

Answer:

c. are based on statistical data, measurement and metrics

Explanation:

Data driven process are process that are not based on intuition but rather are based on data. This data serves as evidence to back a decision that is to be taken. It therefore means that, whatever decision that will be taken, such a decision will be based on the data presented.

You might be interested in
A ___________ is similar to an intranet in that it uses internet technologies, but is developed for users outside the organizati
Vanyuwa [196]
The blank is extranet
I hope this helped!
6 0
3 years ago
A painting company has determined that for every 115 square feet of wall space, one gallon of paint and eight hours of labor wil
Reptile [31]

Answer:

Follows are the code to the given question:

Wallsize = int(input("Enter the size of wall space for painting(in sq ft): "))#defining variable Wallsize for input value  

rate = int(input("Enter the price of the paint(per gallon): $"))#defining variable rate for input value

per_Gallon = Wallsize/115#defining a variable per_Gallon that calculate its value

print("Number of Gallons of paint: ",per_Gallon)#print value with message

total_Hours = per_Gallon * 8#defining a variable total_Hours that calculate its value

print("Hours of labor required: ",total_Hours)#print value with message

paint_Cost = rate * per_Gallon#defining a variable paint_Cost that calculate its value

print("Cost of the paint: $",paint_Cost)#print value with message

labor_Charge = total_Hours * 20#defining a variable labor_Charge that calculate its value

print("Labor charges: $",labor_Charge)#print value with message

total_Cost = paint_Cost + labor_Charge#defining a variable total_Cost that calculate its value

print("Total cost of paint job: $",total_Cost)#print value with message

Output:

Enter the size of wall space for painting(in sq ft): 800

Enter the price of the paint(per gallon): $33

Number of Gallons of paint:  6.956521739130435

Hours of labor required:  55.65217391304348

Cost of the paint: $ 229.56521739130434

Labor charges: $ 1113.0434782608695

Total cost of paint job: $ 1342.6086956521738

Explanation:

Please find the complete question in the attached file.

In this code, the "Wallsize and rate" two variable is defined that is used for input the value from the user-end, after input the value multiple variables"

per_Gallon, total_Hours,paint_Cost, labor_Charge, and total_Cost" is declared, in which it calculates its respective value and prints the value with the message value.

3 0
3 years ago
A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
bija089 [108]

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered

5 0
3 years ago
During which phase of the software development process are developers MOST likely to log bugs
sleet_krkn [62]

Answer:

The answer is the testing phase.

Explanation:

<em>Testing is the part of software development wherein developers performs test on the system to encounter bugs and possible errors before they would deploy the system. The aim of testing is to ensure that the system meets its objective (or the system perform its desired function). In any case that there is a bug or error present during the test, testers must logged it in and developers must go back to the coding stage to fix bugs they found in codes and system process.  Then testers would run series of tests again to ensure that the previous errors are gone. This will be repeatedly executed until the system is down to 0 errors before it will be introduced to the clients or desired users of the system.</em>

4 0
3 years ago
Read 2 more answers
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security
a_sh-v [17]

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

<h3>How to explain the information?</h3>

Authentication works as follows:  

  • Prompting the user to enter the credentials.  
  • Send credentials to the authentication server.  
  • Match the credentials.  
  • Authorize the user and grants the acces

<u>External Website security:  </u>

  • Use of firewall.  
  • Implement the access control.  
  • Use of MVC (Model View Controller)
  • Use of encryption.  
  • Use of SSL certificate.
  • Use of security plugins.  
  • Use of network monitoring team.  

<u>Internal Website security:  </u>

  • Use of authentication to identify the user identity.  
  • Use of authorization to provide different user with the specific privileges and access.  
  • Encrypt or hide sensitive web pages.  
  • By implementing IT policies.  
  • Educate the user about the website.  

<u>Remote Access Solution</u>:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

<u>Firewall and Basic rules recommendations</u>:  

  • Firewall is important for managing the traffic and providing external website security.  
  • Rules to prevent SQL injection and XSS.  
  • Allow only the specific type of traffic.  
  • Use access rules for IP security.  
  • Implement certain IT policies.  

<u>Wireless Security:  </u>

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

<u>VLAN configuration:  </u>

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

<u>Laptop Security Configuration:  </u>

Use of password, VPN and the registering the laptop will provide laptop security. .  

<u>Application policy recommendations</u>:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

<u>Security and privacy policy recommendations:  </u>

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

<u>Intrusion detection or prevention for systems containing customer data:  </u>

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

brainly.com/question/5939963

#SPJ1

7 0
1 year ago
Other questions:
  • The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
    7·1 answer
  • Desktop computer systems are less reliable than laptop computers. <br> a. True <br> b. False
    9·1 answer
  • When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
    15·1 answer
  • Who wrote the first computer program after floppy disc and dos
    5·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • HURRY please!!!!
    13·1 answer
  • When do you use an else statement?
    10·1 answer
  • Why is John Von Neumann to a remarkable name?<br>si​
    15·1 answer
  • --concept mapping--
    5·1 answer
  • What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!