1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
14

Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform

ation security infrastructure elements. Group of answer choices True False
Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
5 0

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

You might be interested in
Which of the following electronic collaboration techniques is the best
muminat

Answer:

D. project management software

6 0
2 years ago
Read 2 more answers
Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
Anna [14]

Answer:

HTML, CSS, JavaScript, python, SQL

Explanation:

To create a web page for her travel adventures Dani has to use HTML and CSS to design the page's layout. A beautiful simple design such as one which shows photos of her on her travel destinations, and a paragraph for her to write a little story on her travels would do.

Dani needs JavaScript to animate the photos she's going to post on the page. Dani also should use python to build the backend of her page so she can write codes to save and access her documented adventures from the database. She should use a database language like SQL to save all of her adventures so she can view them at a later time for the memories.

7 0
2 years ago
Run-time parameters passed to a function allow you to use different values each time the function is called.
stich3 [128]

Answer:

True

Explanation:

Run-time parameters passed to a function allow you to use different values each time the function is called. Let us consider an example:

int add(int a,int b){

   return a+b;

}

Now we can execute the same function with different parameters at runtime:

add(3,4) returns 7.

add(1,2) return 3.

add (10,1) return 11.

During each invocation , the formal function parameters are substituted by actual runtime values and the function code is executed.

8 0
2 years ago
When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the abo
natta225 [31]

Answer:

yest that's correct.

Explanation:

for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.

some people will become lazy and don't use their brain for anything

7 0
2 years ago
The line of code after a line beginning with the word 'else' needs to begin with a(n) ___.
Julli [10]
The answer to your question is D
7 0
1 year ago
Other questions:
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • )a___ is a complete binary tree such that each node in the tree contains a comparable object that us greater than or equal to th
    9·1 answer
  • What’s a sign you should talk to an adult about your online time
    14·2 answers
  • A forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation is
    10·1 answer
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • What are horizontal and vertical page break? how and where are these inserted?​
    10·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
  • The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Pape
    15·1 answer
  • After selecting the Slide Master tab (within the View tab), which actions can a user take to configure a slide master?
    8·1 answer
  • What mathematical equation was created by a founder of intel?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!