1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
3 years ago
7

The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified

by the CISO, and resolving issues identified by technicians is known as a(n) ____________.\
Computers and Technology
1 answer:
choli [55]3 years ago
6 0

Answer:

Security Manager

Explanation:

You might be interested in
Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "non-negative" otherwise. Ex:
ArbitrLikvidat [17]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 

 System.out.print("Enter a number: ");

 int userVal = input.nextInt();

 

 String aString;

 if(userVal < 0)

     aString = "negative";

 else

     aString = "non-negative";

     

 System.out.println(aString);

}

}

Explanation:

Ask the user to enter a number and set it to userVal

Check the value of userVal. If it is smaller than 0, set the string as "negative". If it is not, set it as "non-negative"

Print the string

8 0
3 years ago
after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
Elden [556K]
I wouldn’t say anything because no-one is allowed in the pilot room and also i am landing the aircraft down but the I would talk to them after the flight
3 0
2 years ago
You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
Elena L [17]

Answer:

step 1: sign up for an intune account

step 2: create intune user accounts

step 3: define intune policies

step 4: enroll mobile devices

step 5: link mobile devices to users.

Explanation:

The Microsoft Windows intune is a Microsoft cloud-based service that provides a central cloud service for all subscribed and linked devices. It provides a sense of security of data resource and tracking of device activities.

A company subscribes to intune to allow the use of both cooperate and BYOD (bring your own device to work), to access data. First, the administrator sign up and create the intune account, then defined the intune security policies. Then it enrolls the individual devices and links them to their respective users.

3 0
3 years ago
State 3 file formats explain them in an understanding manner apart from Microsoft word and PDF
natita [175]

Answer:

Hope below explanations are enough.

Explanation:

1. JPEG (or JPG) - Joint Photographic Experts Group

JPEGs might be the most common file type you run across on the web, and more than likely the kind of image that is in your company's MS Word version of its letterhead. JPEGs are known for their "lossy" compression, meaning that the quality of the image decreases as the file size decreases.

You can use JPEGs for projects on the web, in Microsoft Office documents, or for projects that require printing at a high resolution. Paying attention to the resolution and file size with JPEGs is essential in order to produce a nice looking project.

2. PNG - Portable Network Graphics

PNGs are amazing for interactive documents such as web pages, but are not suitable for print. While PNGs are "lossless," meaning you can edit them and not lose quality, they are still low resolution.

The reason PNGs are used in most web projects is that you can save your image with more colors on a transparent background. This makes for a much sharper, web-quality image.

3. GIF - Graphics Interchange Format

GIFs are most common in their animated form, which are all the rage on Tumblr pages and in banner ads. It seems like every other day we have a new Grumpy Cat or Honey Boo Boo animated GIF. In their more basic form, GIFs are formed from up to 256 colors in the RGB colorspace. Due to the limited number of colors, the file size is drastically reduced.

This is a common file type for web projects where an image needs to load very quickly, as opposed to one that needs to retain a higher level of quality.

4. TIFF - Tagged Image File

A TIF is a large raster file that doesn't lose quality. This file type is known for using "lossless compression," meaning the original image data is maintained regardless of how often you might copy, re-save, or compress the original file.

Despite TIFF images' ability to recover their quality after manipulation, you should avoid using this file type on the web -- it can take forever to load. TIFF files are also commonly used when saving photographs for print.

5. PSD - Photoshop Document

PSDs are files that are created and saved in Adobe Photoshop, the most popular graphics editing software ever. This type of file contains "layers" that make modifying the image much easier to handle. This is also the program that generates the raster file types mentioned above.

The largest disadvantage to PSDs is that Photoshop works with raster images as opposed to vector images.

6 0
2 years ago
The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.
mario62 [17]

In the case above, To search through this database, they use SQL, a 4GL.

<h3>What is SQL?</h3>

SQL is known to be Structured Query Language (SQL) that is said to be a form of standardized programming language that is employed to manage relational databases and carry out various operations on the data in them.

Note that In the case above, To search through this database, they use SQL, a 4GL network that can help.

Learn more about SQL from

brainly.com/question/25694408

#SPJ1

7 0
1 year ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • "Technician A says that Ohm's law can be used to determine circuit current flow if total circuit resistance and total voltage ar
    14·1 answer
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • A keyboard is a/an _____. interconnector port packet NAS
    7·1 answer
  • Which if the following ribbons in Microsoft word is used to add tables and images
    14·1 answer
  • Brainliest
    13·2 answers
  • Which of these is installed only on Apple smartphones and tablets?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!