1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
7

Research for a project should be based on?

Computers and Technology
2 answers:
Harman [31]3 years ago
4 0

Answer:

The answer to the following question is the option "C".

Explanation:

In computer science, the term research is a careful and detailed study of any topic. In this, we search for basic details like advantages, disadvantages, why and where we will use, etc. The wrong option can be given as:

In option(a) Gathering information is used in making a project or report.

In option(b) In research, we search for everything about the topic, not interesting things.

In option (d) In research, we do not check its availability.

The correct answer for the given question is option (c) which is "the questions that need to be answered".

Naddika [18.5K]3 years ago
3 0
C. the questions that. need to be answered
You might be interested in
Methods used to change variables are called ______. equals accessors toString void mutators
Sindrei [870]
Look this up on Quizlet. Besure to check the question and the answers carefully by using "define + the vocabulary word" you think answers the question.

Here is the exact site: just copy it and search and click...

<span>AP Comp Sci Chapter 5</span>
6 0
3 years ago
How to send an email to multiple recipients individually.
zheka24 [161]

Answer:

The BCC method

Explanation:

4 0
2 years ago
Who want followers on Instagram... gotta follow back
Alexxx [7]

Explanation:

I dont have Instagram....

6 0
3 years ago
Read 2 more answers
Which structures protect the cell? Select two options.
Rzqust [24]

Answer:

cell wall

cell membrane

3 0
2 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
Other questions:
  • Write a main method that prompts the user for an integer between 1 &amp; 10 (inclusive). If the user enters an invalid number, p
    10·1 answer
  • Select the proper ergonomic keyboarding techniques.
    9·1 answer
  • Write a function called lucky_sevens that takes in one #parameter, a string variable named a_string. Your function #should retur
    15·1 answer
  • Based upon what you know
    5·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • Which of these jobs would be most appropriate for someone who majors in information technology? A)developing new computing techn
    5·2 answers
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • Jim, your organizations IAM, has been contacted by the Program Manager to assist in implementing the DIACAP. Jim is not required
    11·1 answer
  • Rita tried unsuccessfully to open a PDF file attachment in her Inbox by double-clicking the attachment in the Reading Pane. What
    8·1 answer
  • How do you convert an algorithm to make it possible for a computer to read
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!