1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
2 years ago
10

which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]2 years ago
4 0

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

You might be interested in
Bertha was recording a drama club practice. during editing, she noticed that she missed recording the beginning of a shot in the
Ray Of Light [21]

Bertha should use end roll technique so that she doesn't miss the initial action of a drama.

b. end roll

<u>Explanation:</u>

End roll is a simple method to decide whether the film is pushing ahead or not. When you utilize the film advance to wind the film, you essentially need to check if the handle on the left (that you use to rewind the film) is turning.

In the event that it turns, great, it implies that the film is appropriately locked in. So Bertha should utilize the end move strategy with the goal that she doesn't miss the underlying activity of a dramatization.

5 0
3 years ago
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
pantera1 [17]

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

4 0
3 years ago
A photo's color intensity can be modified by changing the brightness and content.
fiasKO [112]
The above statement is FALSE.

A photo's color intensity can be modified by changing the brightness and CONTRAST.

There are four common image controls that makes an image easy to view. These controls are brightness, contrast, saturation, and sharpness.

Brightness control simply brightens the whole image from the shadows to the highlights equally.

Contrast control is the separation between the darkest and brightest areas  of the image.

Saturation control is the separation of colors in the image.

Sharpness control is defined as the edge contrast, meaning the edges in the image are the ones being contrasted.
6 0
3 years ago
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
What technology will I use when I become a surgical technologist?
otez555 [7]

Explanation:

Preoperative: Sterile Hands

The surgical technologist is the first person to enter the OR before surgery. During this preoperative phase the surgical technologist adheres closely to the following routine:

Carefully dons his or her operating room attire, including scrubs

Begins to prepare and sterilize the room

Gathers all of the equipment and surgical tools that the surgery requires

Sterilizes, counts and carefully arranges them

The most important part of this preoperative phase is creating and maintaining the OR’s sterile environment. Sterile fields can be compromised in a variety of ways, the most common of which is by introducing moisture. To prevent this, the surgical technologist is responsible for arranging dry drapes around the operating table and keeping all surfaces in a sterile condition.

Intraoperative: The Third Hand

During the intraoperative phase of the surgery, surgical technologists are still responsible for maintaining the sterility of the OR, but they also effectively become a “third hand” to the surgeon and surgeon’s assistant during the procedure and perform the following tasks:

Help prepare medications and administer them to the patient

Assist in retracting tissues from the patient

Passes the surgical tools to the surgeon and surgical assistant during the operation

At any time during an operation, if a tool is missing or contaminated, the delay or resulting infection could cost a patient his or her life. That is why surgical technologists must be diligent and thorough at all times.

Postoperative: Tying Things Up

As the operation concludes, surgical techs are responsible for the following:

Counting all of the tools and instruments used during surgery to ensure that nothing is left behind in a patient

Suture the incision and apply disinfected dressings to the area

Dispose of items such as needles and gauze, and continue to maintain the OR’s sterile environment until the patient is sent to the recovery ward

Thinking-On-Your-Feet: Cell Phones in the OR

While surgical techs aren’t expected to work miracles, they must be able to think quickly on their feet in emergency situations. During a recent hospital blackout and emergency generator failure, one quick-thinking surgical tech, with the help of the patient’s family member, rounded up enough cell phones to illuminate the OR while surgeons completed an emergency appendectomy.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Trevor got home from work and suddenly realized that he needed to edit a certain file stored in the company network's server. ho
    11·1 answer
  • During the processing stage what does the computer do
    12·1 answer
  • Write a function called calculate() that accepts three integer Numbers as arguments, compute these values : Sum and Product and
    7·1 answer
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • How can an individual find career data?
    13·1 answer
  • I wonder how world is created
    12·2 answers
  • Your friend Suzy calls to ask for help with her computer. She says when she first turns on the computer, she doesn’t hear a spin
    10·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • What is the output?
    11·1 answer
  • The direction of a ratchet is reversed by _______________________.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!