1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
13

What does an Information security analysts do?

Computers and Technology
1 answer:
coldgirl [10]3 years ago
4 0

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

You might be interested in
Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
lyudmila [28]

I am not able to open the pdf kindly send the jpg form.

4 0
3 years ago
Read 2 more answers
Hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Marianna [84]

Answer:

hello

Explanation:

how are you?

7 0
3 years ago
Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
hoa [83]

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

5 0
3 years ago
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
3 years ago
The countryside presents
Rainbow [258]
C because there’s hella random stuff
5 0
4 years ago
Other questions:
  • Store operations has installed a new inventory ordering system that is expected to reduce the time it takes to place orders by 2
    11·1 answer
  • Which of the following skills do employers in any field expect their employees<br> to have?
    5·1 answer
  • Now suppose there are four links between source and destination (three routers in the path between source and destination). Each
    8·1 answer
  • Please answer the following essay question:
    13·1 answer
  • In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
    15·1 answer
  • Join my me et.goo gle.etj-dovn-kds​
    11·1 answer
  • If you get your foot stuck in a cloud how many colors can you smell with you ears
    8·1 answer
  • Complete the following statements by choosing the correct answer from the drop-down menus.
    6·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
  • What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!