1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
10

To make sound decisions about information security, management must be informed about the various threats facing the organizatio

n, its people, applications, data, and information systems.A. TrueB. False
Computers and Technology
1 answer:
const2013 [10]3 years ago
8 0

Answer:

The answer is A. True

Explanation:

It is the responsibility of management to be aware of the current and potential threats that the organization is facing or prone to face in the nearest future. The threats could be focused on data integrity, valuable information, applications, or human personnel.

Hence, to make adequate decisions on information security, the management must take an assessment of the current situation of the organization and make plans towards securing the organization.

You might be interested in
In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise
Shtirlitz [24]

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

3 0
3 years ago
Describe any five Morden application areas of computer​
Alecsey [184]

Answer:

Some of the application areas of computer are 

1.banking,

2.education,

3.industries,

4.entertainments,

5.hospitals,

7 0
3 years ago
What are the names of the components (each shown with a leader and line) of the circuit shown in the diagram?
serg [7]

Answer:

light bulb battery on/off switch

Explanation:

lol

8 0
4 years ago
ANIME IS LIFE<br> GET WRECKED LIGHT
murzikaleks [220]

Answer:

i love anime

Explanation:

8 0
3 years ago
Read 2 more answers
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
nata0808 [166]

A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.

Explanation:

  • When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
  • What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
  • It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
  • All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
  • What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
  • When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
  • If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
  • If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
  • All the layers processes are connected to each other and work cooperatively.
5 0
3 years ago
Other questions:
  • Which command would you use to have a workstation stop using an ip address?
    11·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0
    6·1 answer
  • How do a router and switch differ when handling a message? Both a router and a switch use the message’s destination address to s
    10·1 answer
  • When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
    5·1 answer
  • Open punctuation means that no punctuation follows the salutation or complimentary close. *
    9·1 answer
  • A sequence of direct connections
    10·1 answer
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • Give two examples of situations or applications where electrical circuits are used.
    15·1 answer
  • Does kohl's sell homecoming dresses?? And if do you know what the price rage would be !!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!