1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
4 years ago
9

Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices

were stolen. Alan decides to implement full disk encryption on all mobile devices. What risk response did Alan take?
Computers and Technology
1 answer:
Kipish [7]4 years ago
5 0

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

You might be interested in
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these
vampirchik [111]

Using the computational knowledge in python it is possible to write a code that uses the functions to make a  a prolog program to answer the following queries

<h3>Writting the code in python:</h3>

<em>valid([]).</em>

<em>valid([Head|Tail]) :-</em>

<em>fd_all_different(Head),</em>

<em>valid(Tail).</em>

<em />

<em>sudoku(Puzzle, Solution) :-</em>

<em>Solution = Puzzle,</em>

<em>Puzzle = [S11, S12, S13, S14,</em>

<em>S21, S22, S23, S24,</em>

<em>S31, S32, S33, S34,</em>

<em>S41, S42, S43, S44],</em>

<em />

<em>fd_domain(Solution, 1, 4),</em>

<em />

<em>Row1 = [S11, S12, S13, S14],</em>

<em>Row2 = [S21, S22, S23, S24],</em>

<em>Row3 = [S31, S32, S33, S34],</em>

<em>Row4 = [S41, S42, S43, S44],</em>

<em />

<em>Col1 = [S11, S21, S31, S41],</em>

<em>Col2 = [S12, S22, S32, S42],</em>

<em>Col3 = [S13, S23, S33, S43],</em>

<em>Col4 = [S14, S24, S34, S44],</em>

<em />

<em>Square1 = [S11, S12, S21, S22],</em>

<em>Square2 = [S13, S14, S23, S24],</em>

<em>Square3 = [S31, S32, S41, S42],</em>

<em>Square4 = [S33, S34, S43, S44],</em>

<em />

<em>valid([Row1, Row2, Row3, Row4,</em>

<em>Col1, Col2, Col3, Col4,</em>

<em>Square1, Square2, Square3, Square4]).</em>

<em />

<em>| ?- sudoku([_, 4, 3, 2,</em>

<em>3, _, _, _,</em>

<em>4, 1, _, _,</em>

<em>_, _, 4, 1],</em>

<em>Solution).</em>

<em>Solution = [1,4,3,2,3,2,1,4,4,1,2,3,2,3,4,1]</em>

<em>yes</em>

See more about python at brainly.com/question/18502436

#SPJ1

7 0
2 years ago
Its an HTML5 anyone kwons
Aleksandr [31]

Answer:

1 will be stored in result

Explanation:

Given

The lines of code

Required

Determine the value stored in result

The value stored in result is determine by the condition (x<3 && y ==6)

In the first line, the value of x is 2 and the value of y is 6

So: x<3 is true because x = 2 and 2 is less than 3

y == 6 is also true because y = 6 and 6 is equal to 6

So, the condition (x<3 && y ==6) is true and true will be saved in variable result

Because result is a Boolean variable which can only take true or false value

1 represents true

0 represents false

<em>So, 1 will be stored in result</em>

7 0
3 years ago
What command is used to request the name and address information from a dns server?
topjm [15]
Nslookup is deprecated in favor of dig
7 0
4 years ago
How to start Microsoft acess​
Gennadij [26K]

Answer:

As with most Windows programs, Access can be executed by navigating the Start menu in the lower left-hand corner of the Windows Desktop. To start Access, click on the Start button, then the Programs menu, then move to the Microsoft Office menu and finally click on the Microsoft Access menu item.

7 0
3 years ago
Other questions:
  • When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
    8·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • What geek fest convention kicks-off today?
    8·1 answer
  • How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
    6·1 answer
  • Are goals that<br> have concrete criteria for measuring<br> progress toward their attainment.
    5·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • Does anyone know how to use a green screen
    8·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • Which of the following is false? Group of answer choices A) A string may include letters, digits, and various special characters
    7·1 answer
  • What programming language does the LMC 'understand'?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!