1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
4 years ago
14

After the security breach at CardSystems Solutions, a security assessment of the security measures used at the company proved th

at the company:
1. was not PCI DSS-compliant.
2. was fully PCI DSS-compliant.
3. was not PCI DSS-compliant.
4. had not followed industry best practices.
5. was guilty of fraud.
Computers and Technology
1 answer:
Verizon [17]4 years ago
8 0

Answer:

Was not PCI DSS- compliant.

Explanation:

This is a payment Card industry data security standard which is an information security standard that deal with branded credit card.

You might be interested in
Help me please and thanks
Yuri [45]

Answer:

b

Explanation:

6 0
4 years ago
How many keys are on a microsoft windows standard keyboard
DiKsa [7]

There are 101 keys on a microsoft windows standard keyboard

7 0
4 years ago
Read 2 more answers
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
77julia77 [94]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
6 0
3 years ago
Read 2 more answers
Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
Dmitriy789 [7]

Answer:

The solution code is written in Python 3

  1. count = 0
  2. sum = 0
  3. num = input("Enter a number: ")
  4. while(num != ''):
  5.    sum += float(num)
  6.    count += 1
  7.    num = input("Enter a number: ")
  8. print("Sum : " + str(sum))
  9. print("Average: " + str(sum / count))

Explanation:

Firstly, we declare two variables count and sum to hold the number of input number and the total of the input number, respectively (Line 1-2)

Next, we prompt user to input the first number (Line 4). While the num is not ' ' (This means it is not "Enter" key), accumulate the num to sum variable and increment count by one (Line 6-8) and then prompt the user to input the next number (Line 9).

At the end, display the sum and average using print function (Line 11 -12).

5 0
4 years ago
Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
slavikrds [6]

Answer:

Here are the for loop for the given question.

 for (i = 0; i < NUM_VALS; i++)  // for loop

       {

         /* check if the value of i is equal to NUM_VALS or not.If it is

         equal then just print the value without comma.*/

       if(i==(NUM_VALS-1))  // if block

       System.out.print(hourlyTemp[i]);

  /* if i is not equal then just print the value with comma.*/

       else   // else block

       System.out.print(hourlyTemp[i] + ", ");

       }

Explanation:

In this we iterating the for loop  and check the condition

check if the value of i is equal to NUM_VALS or not.If it is  equal then just print the value without comma

If i is not equal then just print the value with comma .

Output:

90,92,94,95

3 0
3 years ago
Other questions:
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • Presentation software allows business professionals to _____.
    14·2 answers
  • What is an enterprise system
    14·2 answers
  • One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
    13·2 answers
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • True or false As the contents and topics of new magazines change year-to-year, you can see various trends and movements across s
    15·1 answer
  • 20
    8·1 answer
  • Radio spectrum is the part of the complete range of electromagnetic waves that is used for radio communication from
    14·1 answer
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!