1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miskamm [114]
3 years ago
8

In the 5 Code of Federal Regulations (C.F.R.), it is recommended that an individual has security awareness training before s/he

can access information. The C.F.R is unusual in that it requires all users to receive broad training in system/application life cycle management, security planning and system/application security management, risk management, and contingency planning.A. TrueB. false
Engineering
2 answers:
GarryVolchara [31]3 years ago
6 0

Answer: A it is true.

Explanation: It is true under Subpart C—Information Security Responsibilities for Employees who Manage or Use Federal Information Systems

Number 3 and 4

(3) Program and functional managers must receive training in information security basics; management and implementation level training in security planning and system/application security management; and management and implementation level training in system/application life cycle management, risk management, and contingency planning.

(4) Chief Information Officers (CIOs), IT security program managers, auditors, and other security-oriented personnel (e.g., system and network administrators, and system/application security officers) must receive training in information security basics and broad training in security planning, system and application security management, system/application life cycle management, risk management, and contingency planning.

Helen [10]3 years ago
5 0

Answer:

B. False

Explanation:

The Code of Federal Regulations (C.F.R.) also called the administrative law refers to the codes of conducts that governs and sets the boundaries for administrative agencies in the United States.

The C.F.R. code stipulates that every individual who wants to access the Federal Information System be exposed to a certain basic level of security awareness before doing so. However, the C.F.R. does not stipulate that all users undergo broad training in system/application life cycle management, security planning and system/application security management, risk management, and contingency planning.

According to the C.F.R. code, training is made available to individuals based on their roles and responsibilities; Executives receive a basic security training, Program managers receive management training as well as basic security training, Chief Information Officers & other security-oriented personnels are the ones that receive broad training in system/application life cycle management, security planning and system/application security management, risk management, and contingency planning.

The C.F.R. code also stipulates that new employees be introduced & acquainted with security training depending on their roles/positions before granting them access to the systems, that current employees be refreshed often with security training and to make security training available to employees when there is any significant change in the agency's information system procedure or if an employee is given a new role that demands additional training.

You might be interested in
What is kirchoff's current law?​
Anastaziya [24]

Answer:

The sum of all currents entering a junction is 0

Explanation:

Current cannot disappear, so the currents leaving a junction have to equal the currents entering a junction. If you would give the currents leaving the junction an opposite sign (e.g., negative) it implies that the sum of all these currents is exactly 0.

4 0
3 years ago
Read 2 more answers
1)What are the three previous manufacturing revolutions Mr. Scalabre mentions? When did these take place?
Ostrovityanka [42]

The three previous manufacturing revolutions that Mr. Scalabre mentioned and their year of occurrence are:

  1. The steam engine in the mid-19th Century
  2. The mass-production model in the early 20th Century
  3. The first automation wave in the 1970s

<h3>What is a Manufacturing Revolution?</h3>

This refers to the process of change from a handicraft economy to industry production-based production.

Hence, we can see that Mr. Scalabre believes we are not growing in productivity because there has not been enough automation to perform the tasks needed.

The effect of robotics is making an impact on productivity because a lot of complex, difficult tasks are done by machines.

3D printing has made an impact on productivity because there is a reduction in the pressing cycle and errors due to negligence are reduced.

The role the engineers have to play in the next revolution is that they would have to produce mathematical model that can be used to produce better AIs

Read more about manufacturing revolutions here:

brainly.com/question/14316656

#SPJ1

8 0
1 year ago
Modify any of the previous labs which would have crashed when non-numeric data was entered by adding exception handling so that
Mashutka [201]

Answer:

see explaination

Explanation:

import java.util.InputMismatchException;

import java.util.Scanner;

public class calculate {

static float a=0,b=0;

double cal()

{

if(a==0||b==0)

{

System.out.println("no values found in a or b");

start();

}

double x=(a*a)+(b*b);

double h=Math.sqrt(x);

a=0;

b=0;

return h;

}

float enter()

{

float val=0;

try

{

System.out.println("Enter side");

Scanner sc1 = new Scanner(System.in);

val = sc1.nextFloat();

return val;

}

catch(InputMismatchException e)

{

System.out.println("Enter correct value");

}

return val;

}

void start()

{

calculate c=new calculate();

while(true)

{

System.out.println("Enter Command");

Scanner sc = new Scanner(System.in);

String input = sc.nextLine();

switch(input)

{

case "A":

a=c.enter();

break;

case "B":

b=c.enter();

break;

case "C":

double res=c.cal();

System.out.println("Hypotenuse is : "+res);

break;

case "Q":

System.exit(0);

default:System.out.println("wrong command");

}

}

}

public static void main(String[] args) {

calculate c=new calculate();

c.start();

}

}

7 0
3 years ago
Water vapor at 10 MPa, 600°C enters a turbine operating at steady state with a volumetric flow rate of 0.36 m3/s and exits at 0.
elena-s [515]

Answer:

Hook's law holds good up to. A elastic limit. B. plastic limit. C.yield point. D.Breaking point

8 0
3 years ago
Steam enters a radiator at 16 psia and 0.97 quality. The steam flows through the radiator, is con- densed, and leaves as liquid
AnnZ [28]

Answer:

5.328Ibm/hr

Explanation:

Through laboratory tests, thermodynamic tables were developed, these allow to know all the thermodynamic properties of a substance (entropy, enthalpy, pressure, specific volume, internal energy etc ..)  

through prior knowledge of two other properties such as pressure and temperature.  

for this case we can define the following equation for mass flow using the first law of thermodynamics

m=\frac{Q}{h1-h2}

where

Q=capacity of the radiator =5000btu/hr

m = mass flow

then using thermodynamic tables we found entalpy in state 1 and 2

h1(x=0.97, p=16psia)=1123btu/lbm

h2(x=0, p=16psia)=184.5btu/lbm

solving

Q=\frac{5000}{1123-184.5} =5.328Ibm/hr

3 0
3 years ago
Other questions:
  • Describe the steps, tools, and technology needed in detail and
    12·1 answer
  • A water jet strikes normal to a fixed plate. If diameter of the outlet of the nozzle is 8 cm,and velocity of water at the outlet
    11·1 answer
  • Dunno what to ask, okbye
    5·1 answer
  • Which statement concerning symbols used on plans is true?
    10·1 answer
  • A long rod of 60-mm diameter and thermophysical properties rho=8000 kg/m^3, c=500J/kgK, and k=50 W/mK is initally at a uniform t
    8·1 answer
  • 7. What is the voltage across a 100 ohm circuit element that draws a current of 1 A?
    11·1 answer
  • Make a sketch of a simple mechanically expanded brake and indicate the forces ​ ​ acting on the leading shoe when the brake is a
    10·1 answer
  • Engineering practices include which of the following? Select all that apply.
    10·1 answer
  • The side area of the door shell that is concealed when the door is closed is called the:
    15·1 answer
  • What car is this? I thinks its a nissan 240sx but i dont know
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!