1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
5

The cybersecurity defense strategy and controls that should be used depend on __________. Select one: a. The source of the threa

t b. Industry regulations regarding protection of sensitive data c. What needs to be protected and the cost-benefit analysis d. The available IT budget
Computers and Technology
1 answer:
muminat3 years ago
7 0

Answer:

The answer is "Option C"

Explanation:

It is an information warfare-security method, that consists of a set of defense mechanisms for securing sensitive data. It aimed at improving state infrastructure security and stability and provides high-level, top-down, which lays out several new goals and objectives to be met within a certain timeline, and incorrect options can be described as follows:

  • In option a, These securities can't include threats.
  • Option b, and Option d both are incorrect because It is used in industry but, its part of networking.    
You might be interested in
Which set of symbols encloses an if-then code block? Choose the best answer.
Colt1911 [192]

Here's some code that might help, assuming that you are using JavaScript.

e = "Hello"

if(e === "Hello"){

    alert(":D")

}else{

    console.log("Um.")

}

I think that the answer is curly brackets.

8 0
3 years ago
true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create stat
Vladimir79 [104]

The random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s) is a false statement.

<h3>What is the meaning of random number?</h3>

A random number is a pick of a number made seemingly at random from a certain distribution such that the distribution is reproduced when a large collection of these numbers is chosen. Such numbers must almost always be independent in order to prevent relationships between succeeding numbers.

Therefore, a hardware or software algorithm known as a random number generator produces numbers at random from a finite or infinite distribution. Pseudo-random number generators and real random number generators are the two primary varieties of random number generators.

Learn more about random number generator from

brainly.com/question/10352102
#SPJ1

8 0
1 year ago
For a list to be binary search-able, we need the following thing to be true, because... a. The list must be sorted, because chec
rusak2 [61]

Answer:

The answer is option A.

Explanation:

Negative numbers can be found by binary search, this makes option B incorrect.

Unsorted and randomized lists are also not things that support a binary search, options C and D are incorrect.

Binary search uses a technique where the middle element of the list is located and used to determine whether the search should be done within the lower indexed part of the list or the higher. So for a list to be binary search-able, it should be sorted and not randomized.

The answer is A.

I hope this helps.

7 0
3 years ago
Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while Win
GalinKa [24]

Answer:

see my discussion as explained bellow

Explanation:

4 0
3 years ago
Convert the following Base 10 (decimal) numbers to base 2(binary):<br> 107<br> 200
melamori03 [73]

<u>Answer:</u>

107₁₀ - 1101011

₂ (Binary representation)

200₁₀- 11001000₂ (Binary representation)

<u>Explanation:</u>

Converting from Decimal to binary:

Procedure -

1. Divide the number by 2, write the reminder separately.

2. Divide the divisor by 2, write the reminder before the previously written reminders.

Keep doing this till you get your divisor as 1.

Then we will write the divisor  before the written reminders and that will be the binary representation.

   

 For 107 :

       

          We divide 107 by 2 ,we get the divisor 53 and remainder 1

                                                  ( 1 )

Then,we will divide this divisor i.e 53 by 2,we get divisor 26 and remainder 1 ,we will put this remainder before the previous one.

                                                ( 1 1 )      

Then,we will divide this divisor i.e 26 by 2,we get divisor 13 and remainder 0 ,we will put this remainder before the previous one.    

                                                 ( 0 1 1 )

Then,we will divide this divisor i.e 13 by 2,we get divisor 6 and remainder 1 ,we will put this remainder before the previous one.    

                                                 ( 1 0 1 1 )

Then,we will divide this divisor i.e 6 by 2,we get divisor 3 and remainder 0,we will put this remainder before the previous one.    

                                                 ( 0 1 0 1 1 )

Then,we will divide this divisor i.e 3 by 2,we get divisor 1 and remainder 1  ,we will put this remainder before the previous one.    

                                                 ( 1 0 1 0 1 1 )

As we get the divisor=1,then we will stop.we will write the divisor before the written reminders.

                                              ( 1 1 0 1 0 1 1 )

This will be the binary representation of 107.

For 200 :

         We divide 200 by 2 ,we get the divisor 100 and remainder 0

                                                  ( 0 )

Then,we will divide this divisor i.e 100 by 2,we get divisor 50 and remainder 0 ,we will put this remainder before the previous one.

                                                ( 0 0 )      

Then,we will divide this divisor i.e 50 by 2,we get divisor 25 and remainder 0 ,we will put this remainder before the previous one.    

                                                 ( 0 0 0 )

Then,we will divide this divisor i.e 25 by 2,we get divisor 12 and remainder 1 ,we will put this remainder before the previous one.    

                                                 ( 1 0 0 0 )

Then,we will divide this divisor i.e 12 by 2,we get divisor 6 and remainder 0 ,we will put this remainder before the previous one.    

                                                 ( 0 1 0 0 0 )

Then,we will divide this divisor i.e 6 by 2,we get divisor 3 and remainder 0  ,we will put this remainder before the previous one.    

                                                 ( 0 0 1 0 0 0 )

Then,we will divide this divisor i.e 3 by 2,we get divisor 1 and remainder 1,we will put this remainder before the previous one.    

                                                 ( 1 0 0 1 0 0 0 )

As we get the divisor=1,then we will stop.we will write the divisor before the written reminders.

                                                 ( 1 1 0 0 1 0 0 0 )

This will be the binary representation of 200.

7 0
3 years ago
Other questions:
  • Peter wants to submit his admission form online. What type of input element will allow him to enter his last name on the web pag
    6·1 answer
  • Which of the following option is correct about HCatalog?
    14·1 answer
  • __________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
    13·1 answer
  • Banking Account
    9·1 answer
  • Please help me I don’t know what to do
    13·2 answers
  • What is a text based language that can be used to build all kinds of things ????
    9·1 answer
  • Meaning and explanation of fortran​
    11·2 answers
  • Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much
    9·1 answer
  • Please help me answering this question
    14·1 answer
  • Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she will
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!