1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
10

Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t

hat appeal to you
the most. Out of the three, write a one-page essay describing which one would be your career choice and the educational pathway that you would
have to follow in order to obtain that career. Finally, identify at least three colleges, universities, or training programs that are suited to that career
choice. You can use the following resources to help you:​
Computers and Technology
2 answers:
andriy [413]3 years ago
4 0

Answer:Computer user support specialist.

Computer systems analyst. ...

Software quality assurance engineer. ...

Computer and information systems manager. ...

Software developer. ...

Web developer. ...

Database administrator. ...

Information security analysts

Explanation:

Elan Coil [88]3 years ago
4 0

Answer:Five careers within the Information Technology cluster that would be interesting to me are video game designer, software developer, database administrator, computer science teacher, and business intelligence analyst. Of those careers, being a video game designer, software developer, or business intelligence analyst sounds the most appealing to me. Out of all those choices, I think that being a business intelligence analyst seems the most interesting.

Business intelligence analysts work with computer database information, keeping it updated at all times. They provide technical support when needed and analyze the market and customer data. At times, they need to work with customers to answer any questions that they have or fix things as needed. The part that I would find most interesting would be collecting intelligence data from reports for the company for which I work. To complete the job, I would need to have great customer service skills, communication skills, critical thinking skills, and knowledge of computers.

Before I could find work as a business intelligence analyst, I would need to complete a bachelor’s degree in computer science to learn how to do computer programming and use other applications that I would need to know for the job. Some of the schools that have a great program for computer science are the University of California at Berkeley, Georgia Institute of Technology, and California Institute of Technology. Once I have completed a bachelor’s degree, I would continue on to get a master’s degree in the field, which would help me advance in my career and get promotions.

Explanation:

You might be interested in
Type the correct answer in the box. Spell all words correctly.
nadezda [96]

Answer: Alt Text.

Explanation:

Alt Text or alt="Text" Allows for the website to load just the description of the image, rather than the image itself. Gets the Same message across without insane load times of large images.

5 0
3 years ago
If you want to remove the autocorrect options button from the screen, you can press the ____ key.
Luden [163]

Answer:

ESC

Explanation:

It allows the user to abort, cancel, or close an operation.

3 0
2 years ago
What is a main cause of a virus on a computer
horrorfan [7]
<em>The main cause of computer viruses is putting an infected USB flash drive into your computer, opening an infected email, going to websites that are dangerous, and downloading infected files Some viruses disguising them self's as pop-ups. Files that could have downloaded themselves while you are on theses dangerous websites are viruses as well.</em>
<em>Be carful and make sure you don't do anything to deal with these! ;)</em>
3 0
3 years ago
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
Listening to music on giggl, join!<br><br> link will be in comments, copy and paste
Ilya [14]

Answer:

umm, we can't say any links

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • ​to prevent intrusions, companies install combinations of hardware and software called _____ to keep unauthorized web users from
    9·1 answer
  • What should be done with statements or sections which are unclear?
    12·2 answers
  • Why is the database management systems (dbms the heart of the database functionality?
    6·2 answers
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • Which of these is an expansion slot type?
    5·1 answer
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!