1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
10

In implementing Security Life Cycle:__________

Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

You might be interested in
And this also please. help​
gregori [183]

Answer:

1. Scanner = reading passports.

2. Barcode reader = automatic stock control.

3. pH sensor = monitor soil in a greenhouse.

4. Microphone = voice recognition.

Explanation:

1. Scanner: Copies paper documents and converts the text and pictures into a computer-readable form. Therefore, it can be used for reading passports.

2. Barcode reader: reads labels containing parallel dark and light lines using laser light or LEDs; the width of each line represents a binary code. Therefore, it is used for automatic stock control.

3. pH sensor: detect changes in acidity levels; data is often in analogue form. Thus, it is typically used to monitor soil in a greenhouse.

4. Microphone: allows audio signals to be converted into electric signals; these can be interpreted by a computer after being converted into digital form. Microphones are used for voice recognition.

5 0
3 years ago
How do you take apart a I pad and put it back together and it still works
vekshin1
I would suggest getting it checked out at the apple store doing it yourself will be quite challenging. Get it done by a professional.

8 0
3 years ago
Quick!<br>who can solve this?<br><br>:}<br>:}<br>:}<br>:}<br>:}​
Musya8 [376]

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry

4 0
2 years ago
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
Which language should you use to add functionality to web pages?
Ede4ka [16]
The anwser is either javascript or HTML
3 0
3 years ago
Read 2 more answers
Other questions:
  • Can I publish all blog post on same day ?
    12·2 answers
  • (tco 3) what vbscript boolean operator could be used to replace the nested selection structure in this pseudocode? if empmedical
    13·1 answer
  • Short Answer: Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could
    8·1 answer
  • Network ____ specify the way computers access a network. a. wires b. files c. standards d. instructions
    13·1 answer
  • Which is the correct attribute syntax
    9·1 answer
  • What method of heat transfer is used when the sun heats the earth?
    14·1 answer
  • Please help with the question no. 5 and 7 please help ​
    6·1 answer
  • What is a compiler? O a tool used to integrate multiple software programs O a tool used to extract a single software program fro
    13·2 answers
  • Define the term algorithm and describe how programmers use algorithms when designing a program.
    8·1 answer
  • Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!