1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
10

In implementing Security Life Cycle:__________

Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

You might be interested in
When was technology created?
ANEK [815]

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

3 0
2 years ago
C++ a. Write a program that uses the function isPalindrome given in example 6-6 (Palindrome). Test your program on the followinn
Whitepunk [10]

Answer:

#include <iostream>

#include <array>

using namespace std;

bool isPalindrome(string str)  

{  

int length = str.length();  

for (int i = 0; i < length / 2; i++)  

 if (toupper(str[i]) != toupper(str[length - 1 - i]))

  return false;  

return true;  

}

int main()

{

array<string, 6> tests = { "madam", "abba", "22", "67876", "444244", "trymEuemYRT" };

for (auto test : tests) {

 cout << test << " is " << (isPalindrome(test) ? "" : "NOT ") << "a palindrome.\n";

}

}

Explanation:

The toupper() addition forces characters to uppercase, thereby making the comparison case insensitive.

5 0
4 years ago
Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
Verizon [17]

Answer:

vvbdndndndndndnznmzxbbsvs

kgkgcicgfhjgyofdhkdyfjfgeghehehehehsbbsbsb

PLS HELP ??? LOL INEED HELP ITS TOO HARD

5 0
3 years ago
Algonac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their re
Masteriza [31]

Answer:

ADD ME ON TIK TOK @ madison.beautiful.dancer

Explanation:

3 0
3 years ago
The EDI ____________layer describes the business application that i
suter [353]

Answer:

a) EDI Semantic Layer

Explanation:

EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.

This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.

Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).

6 0
3 years ago
Other questions:
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • Databases offer many security features including passwords to provide authentication, access levels to determine who can access
    15·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • The practice of texting is most popular and what age group
    12·2 answers
  • LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
    6·1 answer
  • The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
    10·1 answer
  • Derive an expression for the boolean function L(a,c) whose output is 1 when the light would be on. Note that two of the switches
    9·1 answer
  • Which background-repeat value represents this div?
    6·1 answer
  • Since the size of cache is always smaller than the size of the main memory, the sum of bits of the offset and index of a cache w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!