1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
10

3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s

ystem. Prepare a memo to Gray and Personal Trainer’s staff that explains the input and output security controls that will be built into the new systems and the policies that will enforce these controls.
Computers and Technology
1 answer:
Sever21 [200]3 years ago
7 0

Answer:

Check the explanation

Explanation:

in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.

There are:

   Network Security

   Application security

   Physical security

   User security

   File security

   Procedural security

These securities levels are consistent and advantage in building the decisions regarding system security.

There are the following policies applied to each control:

Network Security: Network interface and traffic controlling, encryption of data.

Application Security: Verification of data input/output and update of software proceedings.

Physical Security: Security to servers, computers and physical environment.

User Security: Protection passwords and identify management skills.

File Security: Access Permission allocated to users and editing authorizations given to users.

Procedural Security: Certify safety protection to perform decision-making activities and document shredders.

Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.

You might be interested in
________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
liberstina [14]

Answer:

@(at sign) is the correct answer to the following statement.

Explanation:

Because the following symbol is the "at sign" symbol that is used for the Advanced section in the time range picker that lets the user search for the specified time for the round down the closest entity of a particular period. So, that's why the following answer is correct for the following statement.

8 0
4 years ago
Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
suter [353]

Answer:

Airplane mode has been set on the tablet.

Explanation:

Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.

This is because the Airplane mode has been set on the tablet.

5 0
4 years ago
NEW
creativ13 [48]

Answer:

The correct answer is B. The behavior model of leadership did not address all of the behaviors that leaders may possess.

Explanation:

The behavioral leadership model is a psychological and strategic theory that analyzes the different behaviors and behavior patterns of people who assume strategic or leadership roles within an organization, company or industry.

This theory does not analyze all the behavior patterns of leaders, as it only takes into account the most repeated or common patterns, such as confrontation, pacification or collaboration, for example, but leaving aside other not so common or intermediate behaviors. among those named.

3 0
3 years ago
Which is considered the best way to secure a laptop to a desk in a workplace?
Lorico [155]

Answer:

Lock it in a safe is the best way to secure a  laptop to a  desk in a work space.

Explanation:

Since the end user feels that a laptop can be stolen or taken by others is a safe way to keep hire or her laptop in a  safe place.

Bolt  it:-  it is  not possible, because there   is  no   option available

Lock  it is safe:- this  is  idle or best  solution is  safe his or her laptop

Use an alarm :- the person   who steals the laptop will be more intelligent and he or she knows how to disable the alarm system.

Use  cable lock;- it is easy to remove it.

3 0
3 years ago
Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change
nirvana33 [79]

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

8 0
3 years ago
Other questions:
  • What is last mile in VOIP
    13·1 answer
  • Whatis meant by Translation Lookaside Buffer?
    5·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • "Currency" is a field data type ,it represents Date or time values<br> True or false tho?
    12·1 answer
  • Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to
    12·1 answer
  • A computer is made up of hardware and software ​
    5·1 answer
  • Need help asap
    5·1 answer
  • 1. Harold Worden, then 56-years-old, stole Kodak property
    9·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!