1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
10

A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and proc

edures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.
Computers and Technology
1 answer:
kow [346]3 years ago
7 0

Answer:

security audit

Explanation:

You might be interested in
Within a google form when looking which option do u use?
Wittaler [7]

Well Macy, I don't doubt that you know this and your just testing us but I think you should use all of these.

8 0
3 years ago
You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How
tester [92]

Answer:

4 hard drives are required for RAID 10 and you would set this up in your operating systems (Windows, Linux, Mac) storage management.

7 0
3 years ago
Read 2 more answers
Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so
lara [203]

Answer:

The answer is "standoffs ".

Explanation:

It is rolling metal or plastic pins, which is used to divide the computer frame from the chipset are stiffer springs or pauses. It unplugs the desks, and unscrew the fasteners, which keep the board on to the cases to remove the piece.

  • It is a fixed size hooked divider used only to elevate each element above others and in such an ensemble.  
  • It is generally round or hex, typically made of copper, brass or nylon.
6 0
3 years ago
What is the name for a hardcoded value entered into a formula ?
Debora [2.8K]

The answer is Constant. In a formula these are values which are not changed. It is usually a value derived and is plug in as a factor in the equation. In a spreadsheet a cell can be hard coded when reference into a formula using the '$' sign which precedes the referenced cell.

7 0
3 years ago
Read 2 more answers
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
Other questions:
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents. Out
    10·1 answer
  • You use different office apps to accomplish specific tasks, such a creating a newsletter or producing a sales presentation, yet
    8·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Use the _______ to add a line or circle to your presentation.
    8·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!