1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
10

Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti

on standard attempts to keep a workstation free from viruses and other malware. However, this policy is a preventive control, which means that it tries to prevent an infection through installing scanning software. As such it is lacking in detection control, so it cannot detect and report symptoms of an infection.
a. true
b. flase
Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
5 0

Answer:

B. False

Explanation:

This is false because for a policy to prevent an infection, there are different processes that takes place. Such processes include detecting the type of infection that enters into the system and then trying to fight it off through the programmed tools.

Detection and reporting of symptoms also helps in the identification of the infection before it is fought.

You might be interested in
Your program will read a word (or a whole line) from the user. It will then count the number of vowels in the word (or line) and
Softa [21]

Answer:

Following are the program in the Python Programming Language.

def vowel(): #define function

 print("Enter END to Break") #print message

 while(True): #set while loop

   word=input("Enter words: ") #get input from the user

   count=0 #set count to 0

   if(word=="END"): #set if condition

     break #terminate the loop

   else:

     for i in range(len(word)): #set the for loop

       c=word[i] #initialize in c

       if(c=='a'or c=='e' or c=='i'or c=='o'or c=='u'or c=='A'or c=='E'or c=='I'or c=='O'or c=='U'):

         count+=1 #increament in count by 1

     print("The word " , word , " contains " , count, end=" ")#print message

     if(count==1):#check condition

       print("vowel.")

     else:

       print("vowels")

#call the function

vowel()

Output:

Enter END to Break

Enter words: Vowel

The word  Vowel  contains  2 vowels

Enter words: END

Explanation:

Here, we define a function "vowel()" inside it.

  • Print message for the user.
  • Set the while loop and pass condition is True then, get input from the user in the variable "word" then, set variable "count" and initialize to 0.
  • Set if condition to check if the user input "END" then, the loop will terminate.
  • Otherwise, set for loop which continues from the length of the word.
  • Then, we set if statement which checks the vowel in the word, then increment in count by 1.
  • Print the message in the following format which is mentioned in the question.
  • Then, set if-else statement for check count is equal to 1 then print "vowel." Otherwise, it prints "vowels."

Finally, we call the following function "vowel()".

4 0
3 years ago
Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
GenaCL600 [577]
Snhahshshshshshhshshshsshhshshshshhs
5 0
3 years ago
Assume that an Internet service provider (ISP) intentionally disclosed the contents of a lawful private e-mail message without c
Alexus [3.1K]

Answer:

Electronic Communications Privacy Act of 1986

Explanation:

<em>Electronic communications</em> involve the transfer of data, sounds, images, writing, signals, signs or any form of intelligence radio wire or any other means.

The Electronic Communication Privacy Act of 1986 (ECPA) was passed into law by the US Congress to further restrict inappropriate wiretaps of electronic data or telephone calls and also, prohibit access to stored electronic communications. They further added pen-trap provisions that allow the tracing of communications over the telephone.

All these were put in place to primarily prevent unauthorized access to government communications.

If an Internet Service Provider (ISP) intentionally discloses the content of a lawful private email message without consent, they have violated the Electronic communication Privacy Act of 1986 (ECPA).

4 0
3 years ago
What effect do you think this will have on the program when you run it?
Mandarinka [93]
It depends on what program you are running.
8 0
3 years ago
What is the connection between sites that allows for intersite replication called? (Points : 5) Bridgehead server
Travka [436]

Answer: Site Link

Explanation: Site link is the type connection that is created for the different sites.It helps in the connectivity in the multiple site surrounding known as inter-site and transferring the traffic created by the replication activity.

Other options are incorrect because bridgehead servers is a device to control the domain,subnet is the part of the IP network and domain is used for the identification of address .Thus, the correct option is site link.

4 0
4 years ago
Other questions:
  • A is the smallest unit of application data recognized bysystem software.
    12·1 answer
  • If your accelerator is stuck while driving, first ___.
    14·1 answer
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • How to reset maintenance light on toyota camry?
    12·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Describe the operation of IPv6 Neighbor Discovery. ​
    7·1 answer
  • Join for a pack battle loud microphone.
    10·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!