1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
9

Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following

IG policies, any effort to secure confidential information assets will fail. Why is that? With an old IT adage in mind, even a perfect IT program ………………………...?
Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

Answer:

Option B Is correct. It will fail without user commitment.

Explanation:

In the modern world, technology occupies an essential place. The technological tools in the industry today facilitate and expedite a huge amount of tasks, allowing automated work, mass production, software analysis, quality control, among others.

However, these tools can only work effectively when they are under the observation and supervision of trained human personnel, otherwise, a program designed to make 3D prints can fail, and without anyone to take action, it will cause a great waste of material, time and money.

You might be interested in
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
Sunny_sXe [5.5K]
It is application software
6 0
2 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
A friend emails a presentation to isabella to view. what kind of change can she make?​
fiasKO [112]

Answer:

She can enable editing. She can change the view.

Explanation:

6 0
3 years ago
A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.
Mandarinka [93]

Answer:

decision support system

Explanation:

4 0
2 years ago
Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
kotegsom [21]

Answer:

def LetterGame():

   vowels = ["a", "e", "i", "o", "u", "A", "E", "I", "O", "U"]

   count1 = count2 = 0

   while True:

       choice = input("Enter a letter / digit to stop: ")

       if choice.isdigit():

           break

       elif choice.isalpha():

           count1 += 1

           if choice in vowels:

               count2 += 1

   print("You entered " + str(count1) + " letters, " + str(count2) + " of which weere vowels.")

   print("The percentage of vowels was " + str(count2 / count1 * 100) + "%")

LetterGame()

Explanation:

Create a function called LetterGame

Inside the function:

Create a list of vowels

Initialize count1, counts the total letters, and count2, counts the vowels

Initialize a while loop that iterates until the specified condition is met in the loop

Get the input from the user. If it is a digit, stop the loop. If it is an alphabet, increase the count1 by 1, and also check if it is a vowel. If it is a vowel, increment the count2 by 1

When the loop is done, print the required information

Finally, call the function

4 0
2 years ago
Other questions:
  • Please help i really need to turn this in already
    6·1 answer
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    10·1 answer
  • Which is the highest level of the hierarchy of needs model?
    5·2 answers
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • A program that will read each player’s name and golf score as keyboard input,
    9·1 answer
  • How can i get google assistant on my lava iris 820 smartphone easily???? ​
    10·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • Whats an MAR? lolz better not take my points #bonkers
    12·2 answers
  • Explain ,how the computer network reduces cost of operation? (don't copy from any website)​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!