1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
6

The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont

rol solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of ____________________.
Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
6 0

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

You might be interested in
Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
Hoochie [10]

Answer:

I will code in Javascript.

Preconditions:

The variables k, incompletes has been declared and initialized.

The variable nIncompletes contains the number of elements of incompletes.

The variable stududentID has been declared and initialized.

The variable numberOfIncompletes has been declared.

Script:

numberOfIncompletes = 0; <em>//initialize numberOfIncompletes</em>

for( k = 0; k < nIncompletes; k++) {

      if(incompletes[k] == studentID){ <em>//if the element of array is equal to studentID</em>

         numberOfIncompletes++; <em>//adds 1 to numberOfIncompletes</em>

      }

}

Explanation:

The script uses a for loop to go through the entire array incompletes, comparing the k variable with nIncompletes and adding 1 on each pass.

Then inside the for, uses an if statement to compare if the actual element is equal to studentID, if equal adds 1 numberOfIncompletes.

5 0
3 years ago
Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
charle [14.2K]

Answer:

b. High-end CPU, lots of RAM, and high-end graphics card

Explanation:

Based on the information provided within the question it can be said that the priorities that would best benefit Mykel would be first high-end cpu, ram,  and then high-end graphics card. This is because the cpu and ram will allow Mykel to speed up his processing speeds which will allow for a smoother time when running multiple VM's while developing software. Then the high end graphics card will allow him to play the nest and most graphical intense games out there.

4 0
3 years ago
Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
Serga [27]

Answer:

## http://pastebin.com/nQWtHb3B

#use above link for formatted program #Python3

c=[float(cord) for cord in input('Enter a point with 2 coordinate :').split(' ')]

base=[0,0]

w=10

h=5

if((abs(c[0]-base[0])<= float(w)/2) and (abs(c[1]-base[1])<= float(h)/2)):

print('Point (',c[0],', ',c[1],') is in the rectange')

else:

print('Point (',c[0],', ',c[1],') is not in the rectange')

5 0
3 years ago
Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 38 then the outpu
Likurg_2 [28]

Answer:

Following are the program in the C++ Programming Language.

#include <iostream>

using namespace std;

//define function for swapping

void SwapValues(int* userVal1,int* userVal2){  

//set integer variable to store the value

int z = *userVal1;

//interchange their value

*userVal1 = *userVal2;  

//interchange their value

*userVal2 = z;

}

//define main method

int main()

{    

//declare variables

int x,y;

//get input from the user

cin>>x>>y;

//Call the method to swap the values

SwapValues(&x,&y);

//print their values

cout<<x<<" "<<y;

return 0;

}

<u>Output</u>:

3 8

8 3

Explanation:

<u>Following are the description of the program</u>.

  • Firstly, we define required header file and function 'SwapValues()', pass two pointer type integer variables in argument that is 'userVal1' and 'userVal2'.
  • Set integer data type variable 'z' and initialize the value of 'userVal1' in it, then initialize the value of 'userVal2' in 'userVal1' and then initialize the value of 'z' in 'userVal2'.
  • Finally, define the main method in which we set two integer type variables and get input from the user in it then, call and pass those variables and print it.
6 0
3 years ago
________ are found on the motherboard and are used to attach your hard disk.
Naya [18.7K]
<span>SATAs are found on the motherboard and are used to attach your hard disk.
</span>The SATA standard is most often used today by hard drives to communicate with a system motherboard. SATA stands for <span>Serial AT Attachment.
</span>It is a computer bus<span> interface that connects </span>host bus adapters<span> to </span>mass storage devices<span> such as </span>hard disk drives<span>, </span>optical drives<span>, and </span>solid-state drives<span>.</span>

4 0
3 years ago
Other questions:
  • The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is
    8·2 answers
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
    5·2 answers
  • What are the principal cybersecurity threats, both internal and external, and the principal safeguards that have been developed
    13·1 answer
  • 3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate a
    15·2 answers
  • What does the Python print() function do?
    7·1 answer
  • What is a thoughtware​
    7·1 answer
  • 1. Create an optimized function "print s(n,s)" that prints the given argument s (representing a string) k times. k represents th
    7·1 answer
  • Complete the sentence based on the given information.
    15·1 answer
  • Bluetooth is the popular name for the 802. 15 wireless networking standard, which is useful for creating small __________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!