1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
9

Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices

were stolen. Alan decides to implement full disk encryption on all mobile devices. What risk response did Alan take?
Computers and Technology
1 answer:
Kipish [7]3 years ago
5 0

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

You might be interested in
Write down a program in SNOBOL thatcalculates the factorial of 7.
Sati [7]

Answer:

         n = f = 7

loop  f = gt(n,1) f * (n = n - 1) :s(loop)

         output =  f

end

Explanation:

3 0
3 years ago
Compute the sum of all integers that are multiples of 9, from 1 to 250. Enter your result of your computation in the text box be
shepuryov [24]

The pseudocode to find the sum of all integers that are multiples of 9, from 1 to 250.

totalSum = 0

for i from 1 to 250{

     if i is divided by 9 and remainder is 0{

           totalSum  = totalSum + i;

     }

}

print(totalSum)


in python language the code will be

totalSum = 0

for i in range(1,250):

    if i%9==0:

       totalSum += i



If you will run the program , the answer would be 3402.

8 0
3 years ago
Read 2 more answers
Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
vesna_86 [32]

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

3 0
3 years ago
Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
leonid [27]

Answer:

Total number of character comparison = 43

Explanation:

Using the Brute force algorithm

The string of n characters is known as text, and the string of m characters is known as the pattern.

From the given information:

The text (n)=THERE_IS_MORE_TO_LIFE_THAN_INCREASING_ITS_SPEED

The pattern (m) = GANDHI

The total no of characters that we have in the text = 47

The total number of characters in pattern = 6

For a brute force algorithm;

Since; the first character of the pattern does not exist in the text, then the number of trials made can be attempted can be expressed as = n – m + 1

= 47 – 6 + 1

= 47 – 5

= 42

Thus; the algorithm will attempt the trial 42 times.

Now, for loop in the algorithm to run 42 times, the G in the pattern will have to align against the for T in the text, and in the last case, it will be aligned against the last space.

On each attempted trial, the algorithm will make one unsuccessful comparison.

However, at the trial at which the G in the pattern Is aligned with the G in the text, there will be two successful comparisons.

Hence, we can calculate the total number of character comparison as follows:

Total number of character comparison = \mathbf{\bigg ( ( 42 -  (no. \ of \  failed \ comparison) ) \times 1 + (1 \times ( Two \ successful \  comparisons) ) \bigg ) }

Total number of character comparison = ( (( 42 – 1) × 1 ) + ( 1 × 2) )

Total number of character comparison = 41 + 2

Total number of character comparison = 43

3 0
3 years ago
Which of the following describes a decision support system (DSS)?
levacccp [35]

Answer:

B.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What will be displayed after the following code is executed? def pass_it(x, y): z = x*y result = get_result(z) return(result) de
    13·1 answer
  • What is a custom information field that helps users to find a specific document?
    8·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • Suppose you are on a desert island and possess exactly 20 coconuts your neighbor Friday is a fisherman and he is willing to trad
    14·1 answer
  • Validating the results of a program is important to a. correct runtime errors b. make sure the program solves the original probl
    8·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • CALLING ALL COMPUTER SCIENCE LOVERS!!!!!!!
    14·1 answer
  • What features should you present when demonstrating 2023 murano’s confident cornering?.
    11·1 answer
  • What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!