1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
4 years ago
7

Which of the following are important for protecting computing devices and systems? Physical safeguards like a secure space prote

cted by locked doors, etc. Technical safeguards like passwords, encryption, and protective software. Administrative safeguards like rules against sharing passwords. All of the above
Computers and Technology
1 answer:
Elenna [48]4 years ago
4 0

Answer: All of the above

Explanation:

All the above listed point serves as security measures to safeguard our computing devices and systems.

You might be interested in
What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
kow [346]

2 + 3 + 4 = 9 so the value of result is also 9

8 0
3 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System
jek_recluse [69]

Answer:

It is difficult to <u>convince top management </u>to commit funds to develop and implement an SIS because it can lead to reengineering, which requires businesses to revamp processes to undergo organizational change to gain an advantage.

Explanation:

7 0
4 years ago
Is playing hockey output force or input force?
LUCKY_DIMON [66]

Answer:

Input

Explanation:

got it right on a edunuity test

7 0
3 years ago
Read 2 more answers
Write a statement that reads a floating point value from standard input into temperature. Assume that temperature. has already b
Vladimir79 [104]

Answer:

cin>>temperature;

Explanation:

This statement in c++ will take the input.The value entered by the user  on the screen will be stored in the variable temperature. cin is an standard input method in c++ and is used take input from the screen. It is an object of istream class that is standard input stream .It corresponds to C stream stdin.

8 0
3 years ago
Other questions:
  • When using the strcat function, you must be careful not to overwrite the bounds of an array?
    5·1 answer
  • If I deal seven cards from a standard deck of 52, what is the chance that I will get two triples (three of a kind) and one other
    11·2 answers
  • Syah work as senior designer in creative design company. he is an imaginative person and always updates himself with the latest
    15·1 answer
  • What is a systems development life cycle?
    5·1 answer
  • What is a graphical user interface (GUI)?
    10·1 answer
  • Provide three examples of software projects that would be amenable to the waterfall model. Be specific.
    11·1 answer
  • Susan uploads her newly created files on the web server using FTP. What should she ensure while uploading to prevent other users
    9·2 answers
  • In my mouth In my hair..........​
    15·2 answers
  • n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each
    11·1 answer
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!