Answer:
1. active listening 8. an online journal
2. barrier 1. a strategy for showing other people you are interested in what they are saying and that you understand what they are saying and how they feel about it
3. blog 2. anything that interferes with a message being sent or received
4. communication 5. guidelines for courteous electronic communication
5. netiquette 7. the person who creates or composes a message and delivers it either orally or in writing
6. receiver 9.. a personal belief that one should work hard and do a good job
7. sender 3. an online database of Web pages that can be created or edited by anyone (with permission)
8. wiki 6. the person who receives a message
9. work ethic 4. an exchange of information
Explanation:
The answer is as mentioned above. And these are important words from subject Professional Communication. And like when we talk of an exchange of information, we mean communication. And similarly, other words means as being mentioned above.
Answer:
A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.
Answer:
Following is the expression written in "Bash script" (mixture of commands):
^\d{5}(?:[-\s]\d{4})?$
Explanation:
- ^ = For staring string (denotation).
- \d{5} = Matching 5 digits (first five unknown x's)
- (?:…) = Making Group (making group of former 5 digits)
- [-\s] = Match a hyphen or a space
(checking if a hyphen is present?)
- \d{4} = Matching 4 digits (next four unknown x's)
- …? = Pattern before it is optional
- $ = Ending of the string.(denotation)
Answer:
Available options in question are
- a firewall :
- a server
- an application
- control standard
Answer is : Control Standard. It is not an example of layer of security.
Explanation:
Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.
- A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
- A server is typical example of physical control. In this it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.
- An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples
Control Standard is not an example of Layered Security.