1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mafiozo [28]
3 years ago
11

Jim, your organizations IAM, has been contacted by the Program Manager to assist in implementing the DIACAP. Jim is not required

to assist the PM in this activity, and should pass this activity off to the IAO (or IASO).
Computers and Technology
1 answer:
padilas [110]3 years ago
5 0

IAM stands for<em> </em>Identity Access Management and includes processes focused on control of user access to critical information.

DIACEP on the other hand stands for DoD Information Assurance Certification and Accreditation Process and it is a process which ensures that companies  apply risk management to information systems (IS). According these explanations, the statement that Jim who is IAM in the organization is not required to assist the PM in implementing the DIACAP is false. In contrast, it is required that he works on this process.

You might be interested in
Write a C program to insert and delete values from a stack(to perform pop and push operations) using an array data structure
Bumek [7]
<h2>Answer:</h2>

#include<stdio.h>

// Method to insert a value into a stack

void push(char value, char myStack[], int *top, int sizeOfStack){

   if(*top == -1){

       myStack[sizeOfStack - 1] = value;

       *top = sizeOfStack - 1;

   }

   else if(*top == 0){

       printf("Stack is full. \n");

   }

   else{

       myStack[(*top) - 1] = value;

       (*top)--;

   }

}

//Method to remove a value from a stack

void pop(char myStack[], int *top, int sizeOfStack){

   if(*top == -1){

       printf("Stack is empty. \n");

   }

   else{

       printf("Value removed: %c \n", myStack[(*top)]);

       // Now if the value removed was the last value in the stack

       // you should set top to -1.  

       // This would show that the stack is now empty

       if((*top) == sizeOfStack - 1){

           (*top) = -1;

       }

       else{

           (*top)++;

       }

   }

}

//Method to test the pop and push methods

int main() {

 //variable to hold the size of stack

 int sizeOfStack = 6;

 //create the stack

 char myStack[sizeOfStack];

 

 //set the top to -1

 //this is to show that the stack is initially empty

 int top = -1;

 //insert a value tot the stack

 push('x', myStack, &top, sizeOfStack);

 //print the value on the top

 printf("Value on top of stack: %c\n", myStack[top]);

 //insert another value to the stack

 push('y',myStack, &top, sizeOfStack);

 //print the value on the top of the stack

 printf("Value on top of stack: %c\n", myStack[top]);

 //insert another value to the stack

 push('z',myStack, &top, sizeOfStack);

 //print the value on the top of the stack

 printf("Value on top of stack: %c\n", myStack[top]);

 //remove the last inserted value

 pop(myStack, &top, sizeOfStack);

 //print the value on the top of the stack

 printf("Value on top of stack: %c\n", myStack[top]);

 //remove another value

 pop(myStack, &top, sizeOfStack);

 //print the value on the top of the stack

 printf("Value on top of stack: %c\n", myStack[top]);

 return 0;

}

<h2>Sample Output:</h2>

Value on top of stack: x

Value on top of stack: y

Value on top of stack: z

Value removed: z  

Value on top of stack: y

Value removed: y  

Value on top of stack: x

<h2>Explanation:</h2>

The code above has been written in c and it contains comments explaining important parts of the code. Please go through the comments.

It also contains a sample output resulting from the run of the program.

4 0
3 years ago
Knowing what you know now about frequency analysis, would you feel comfortable sending your password over the Internet using a s
Vikki [24]
According to my opinion, NO, I'd not feel comfortable.

Substitution ciphers in the world of encryption can be cracked very easily. By looking for patterns like one letter words, double letter patterns, and knowing rules such as all words must contain at least an a, e, i, o, u or y, you are probably able to decipher this with so much ease. While this information and the frequency of letters used in the encrypted message might be helpful, it might not be a perfect process.


8 0
3 years ago
Read 2 more answers
Why is the statement if x=y not working in python
Veronika [31]

Answer:

x=1

Explanation:

Re-run your installer (e.g. in Downloads, python-3.8. 4.exe) and Select "Modify". Check all the optional features you want (likely no changes), then click [Next]. Check [x] "Add Python to environment variables", and [Install]

8 0
2 years ago
What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?
KatRina [158]
I use host -a

dig and nslookup could do it, I forget the switches and arguments.
8 0
4 years ago
Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
Alika [10]

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

int x[]={2,3,4,6,7,8,9,1,11,12};//defining 1-D array and assign value

int i,sum=0;//defining integer variable

for(i=0;i<10;i++)//defining loop for count value

{

   if(x[i]%2==1)//defining if block to check odd value

   {

       sum=sum+x[i];//add value in sum variable

   }

}

cout<<sum;//print sum

return 0;

}

Output:

31

Explanation:

In the above-given program, an integer array "x" is declared that holds some integer values, and in the next line two integer variable "i and sum" is defined which is used to calculate the value.

In the next line, a for loop is declared, that counts all array value, and it uses the if block to check the odd value and add all the value into the sum variable.

5 0
3 years ago
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • The top pane of the wireshark window, referred to as the __________, contains all of the packets that wireshark has captured, in
    5·1 answer
  • What term is used to describe an individual's money and personal property? budget income assets finances
    12·2 answers
  • what is the definition of web search(ing)? when I look it up it keeps trying to give me definitions for search engines but that'
    10·2 answers
  • Select the correct answer. Tom recently visited a science exhibition where he learned that computer experts programmed robots to
    6·2 answers
  • A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number
    10·1 answer
  • Write a program using integers userNum and x as input, and output userNum divided by x three times.
    11·1 answer
  • Identify disadvantages that web designers encountered when using tables for page layout. Check all of the boxes that apply.
    10·2 answers
  • What does ADAC mean <br> pls answer quickly i will mrk brainliest
    14·2 answers
  • Which function in Ecels tells how many numeric entries are there​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!