1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
9

PLEASE HELP GIVING 25 POINTS Sophia is leading a project to help clean up a local river in her area. She creates an online forum

where participants can communicate with each other and read the goals of the project. She encourages people to post ideas on this forum and sets up weekly web-conferencing meetings to move the project along. Which qualities show that Sofia is an effective digital leader? Check all that apply. She holds useful online meetings. She encourages collaboration. She pursues her own ideas. She is comfortable with technology. She waits for others to take the lead. She takes action to complete the job.
Computers and Technology
2 answers:
leva [86]3 years ago
6 0

Answer:

Sophia holds useful online meetings ...

Explanation:

Give brainly, sister.

nignag [31]3 years ago
5 0

Answer:

She holds useful online meetings

Explanation:

You might be interested in
Which audio media can be directly sent to the subscribers through an RSS feed?
larisa86 [58]
I believe it’s c sorry if I’m incorrect though
5 0
3 years ago
Is it a way to get robuc 4 free
VLD [36.1K]

Answer:

yes you do survays

Explanation:

3 0
3 years ago
Read 2 more answers
A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor
Flura [38]

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

8 0
3 years ago
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
serious [3.7K]

A Network Intrusion Detection System watches for potentially malicious traffic and triggers Alert when it detects an attack.

<h3>What is Network Intrusion Detection System?</h3>

Network Intrusion Detection System can be regarded as the security system that helps in detection of potentially malicious traffic and gives notification.

Therefore, Network Intrusion Detection System helps to triggers Alert when it detects an attack.

Learn more about Network Intrusion Detection System at:

brainly.com/question/8118353

6 0
3 years ago
Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
Tpy6a [65]

Answer:

design

Explanation:

Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.

5 0
3 years ago
Other questions:
  • When approved for a loan, an individual essentially applied for aid in the area of...
    15·1 answer
  • A ________ is a set of programs that manipulate the data within a database.
    12·1 answer
  • Which of the following information is most important to include in a timeline?
    14·1 answer
  • What is the maximum transmission speed for bluetooth v3 and v4 devices?
    12·1 answer
  • Which is the correct process for attaching a file?
    12·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • HELPPPP PLEASE HURRY
    15·1 answer
  • Which of the following best describes
    13·1 answer
  • What is a typical use for a MAN?
    13·1 answer
  • Create a list of 5 potential jobs that students of computer science can obtain.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!