1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
14

Critical Infrastructure and Key Resources (CIKR) are potential terrorist targets. CIKR might include: Select one: 1. All telecom

munications towers 2. Electrical power generation and transmission facilities 3. Amusement parks 4. Sewage treatment plants
Computers and Technology
1 answer:
Ulleksa [173]3 years ago
5 0

Answer:

The answer is "Every option is right".

Explanation:

In the given question one option is missing, which is defined in the answer section.

The critical infrastructure defines physical and technological networks and services, it is important for the USA, that they would have deteriorating consequences in terms of material or financial protection or human health or security, that's why all option was correct, which can be described as follows:

  • In option 1, It uses a tower for telecom.
  • In option 2, It provides a facility for transmission.
  • In option 3, It is used in the park for provides security.
  • In option 4, It is used in treatment.

You might be interested in
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your b
Sedaia [141]

b check your blind spots frequently i guess not sure

5 0
3 years ago
What is cloud data storage?
bearhunter [10]
Cloud data storage is a model of data storage in which data is managed and backed up on a network.
4 0
3 years ago
Read 2 more answers
The COSO internal control framework identifies five components of an entity's internal control. Which, if any, of those five com
Llana [10]

Answer:

The COSO internal control framework identifies five components of an entity's internal control.

Which, if any, of those five components of Avon's internal control were flawed?

Of those five components of Avon´s internal control the following were flawed:

1) Information and communication

2) Monitoring

3) Control environment

Explanation:

1) Avon’s global internal audit staff thought about offering CPA provisions´s training to the employees, but it never happended due to budgetary limitations, nor it was informed or communicated to them. It was uncovered that the payments were being made to Chinese government officials in 2005,  however working for a U.S. Company, those bribes were not allowed.}

2) Monitoring: In December 2006, Avon’s global internal audit staff followed up doubtful  activity regarding this matter, but there was no monitoring or evaluations that the deficiencies within the internal control were changed to legal practices.

3)  This is a major internal control flaw as Avon discovered that there were illegal bribes being paid to Chinese government officials, thought about informing their employees that is was unacceptable but then chose not to, and finally was surprised when the bribes continued for another year.  This demonstred a lack of commitment to integrity and ethical values.  

7 0
4 years ago
Write a program in Java to display the given pattern.
Elina [12.6K]

Answer:

class Main {  

 public static void main(String args[]) {

   for(int i=0; i<6;i++) {

       for(int j=0;j<i+1;j++) {

           System.out.printf("%d ",2*i+1+2*j);

       }

       System.out.println();

   }

 }

}

Explanation:

You will need two nested loops for sure.

For the exact assignments of variables, many flavors of the solution exist, this is just one possible option.

3 0
3 years ago
Helpppp <br> You can see the output if your html result using any web browser ?<br> True or False
julia-pushkina [17]
True, html code can be seen using any web browser. All web browsers support the most renown and definitely mostly used website designer code language. From chrome to Firefox to safari, you will have no problems checking out your code.
4 0
3 years ago
Other questions:
  • Your company runs a commercial website that enables your business partners to purchase products and manage their accounts. You w
    9·1 answer
  • Each phase of the system development life cycle is accomplished as a discrete, separate step. (1 point) (Points : 1.5) True
    7·1 answer
  • A virus that propagates using the internet or another computer network is called __________.
    10·1 answer
  • 50 points, and brainliest if u get it right!
    13·1 answer
  • The _____ is the button that you push to take a photograph. i think its B Help PLZ
    5·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbp
    14·1 answer
  • Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i
    7·1 answer
  • When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
    10·2 answers
  • PLEASE I NEED HELP, WILL MARK BRAINLYEST!!! 50 POINTS!!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!