1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
13

What does an Information security analysts do?

Computers and Technology
1 answer:
coldgirl [10]3 years ago
4 0

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

You might be interested in
A ____________object appears on a form as a button with a caption written across its face.
andrew-mc [135]

Answer:

Button is correct answer.

Explanation:

Button is the type of object that arrives on a form through the HTML Scripting Language. The programmer can use the button on the form for the submission of the page with the help of a button tag or input tag. They can also change the caption that is written on the button. So, that's why the following answer is correct.

4 0
3 years ago
1. Select the Volatile Memory *
fomenos

Answer:

1 no.

ram

2

harmful software to the computer

3

local area network

4

bit

5

ram

6

morris malware

7

hard disk drive

8

read only memory9

gigabyte

hope this will help u

6 0
3 years ago
Consider ________ when designing for display on a mobile device. font size all of these contrast small screen size
Delvig [45]
To be honest...i really dont know 
6 0
3 years ago
Read 2 more answers
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
How is the “conflict set” defined in Production systems?How conflict is resolved ?
Triss [41]

Answer:

The rules which could trigger at any period in time are referred to as the conflict set. A programming bug/conflict can occur when two programs compete for the same resource such as memory or register etc.

A Conflict Resolution Strategy is is a protocol which highlights which decision will be triggered first.

The best way to resolve conflict is to first determine the kind of conflict it is. Hardware conflicts can be resolved by first troubleshooting the hardware and in some instances unplugging the hardware causing the conflict.

When hardware creates conflicts it may be due to a driver issue. reverting to an old driver or updating the existing one may solve the problem.

Software conflicts can be resolved by installing updates or complete uninstallation.

Cheers!

5 0
3 years ago
Other questions:
  • Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter
    5·1 answer
  • What does the Flippy Do Pro show about representing very small numbers?
    13·1 answer
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Why did Simon bring Michael home?​
    9·2 answers
  • A computer record is used to store all the information about one transaction, but several such records must be used to store the
    12·1 answer
  • What are the consequences of plagiarism?
    7·2 answers
  • Which term best describes a popular marketing strategy that centers
    7·1 answer
  • Which of these are correctly formatted Python tuples? CHECK ALL THAT APPY.
    15·2 answers
  • A section at the top of the page that makes it easy for the recipient to respond to a letter is called a(n
    9·1 answer
  • The Bradshaw family has $200,000 of total assets and $140,000 of liabilities. What is their net worth?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!