1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
Create a script to input 2 numbers from the user. The script will then ask the user to perform a numerical calculation of additi
ohaa [14]

Answer:

The code given is written in C++

First we declare the variables to be used during the execution. The names given are self-explanatory.

Then the program outputs a request on the screen and waits for user input, for both numbers and one more time for the math operation wanted, selected with numbers 1 to 4.

Finally, the program executes the operation selected and outputs the result on screen.  

Code:

<em>#include <iostream> </em>

<em> int main() </em>

<em>{ </em>

<em> // variable declaration </em>

<em> float numberA; </em>

<em> float numberB; </em>

<em> int operation; </em>

<em> float result=0; </em>

<em> </em>

<em> //number request </em>

<em> std::cout<<"Type first number:\n"; std::cin>>numberA; </em>

<em> std::cout<<"Type second number:\n"; std::cin>>numberB; </em>

<em>  </em>

<em> //Operation selection </em>

<em> cout << "Select an operation\n"; </em>

<em> cout << "(1) Addition\n"; </em>

<em> cout << "(2) Subtraction\n"; </em>

<em> cout << "(3) Multiplication\n"; </em>

<em> cout << "(4) Division\n"; </em>

<em> std::cout<<"Operation:\n"; std::cin>>operation; </em>

<em> </em>

<em> switch(operation){ </em>

<em>  case 1: </em>

<em>   result = numberA+numberB; </em>

<em>   break; </em>

<em>  case 2: </em>

<em>   result = numberA-numberB; </em>

<em>   break; </em>

<em>  case 3: </em>

<em>   result = numberA*numberB; </em>

<em>   break; </em>

<em>  case 4: </em>

<em>   result = numberA/numberB; </em>

<em>   break;    </em>

<em>  default: </em>

<em>   std::cout<<"Incorrect option\n"; </em>

<em>  }</em>

<em> //Show result </em>

<em> std::cout<<"Result is:"<<result<<::std::endl; </em>

<em> return 0; </em>

<em>}</em>

5 0
3 years ago
One factor in algorithm performance that we've not had a chance to speak much about this quarter, but one that is certainly rele
Rama09 [41]

Answer:

Quick sort and Merge sort supports parallelism

Explanation:

When we talk about parallelism, we are referring to the idea of breaking down a problem into a number of many subproblems after which we combine the solutions of these subproblems into a single solution. Here we allocate these subtasks to the multicore processors where each core gets assigned each of the subtasks are assigned to a core according to its ability or functionality. After each of the core are through with its evaluation, all their results are collated and combined to come up with a full rounded and complete solution to the given problem.

If we take a look at sorting algorithms such as selection sort, bubble sort and insertion sort, we will find out that these algorithms cant be simulated on a multicore processor efficiently because they are sequential algorithms.

On the other hand, we have sorting algorithms that can easily be simulated in a multicore processor since they can divide the given problem into subproblems to solve after which the solutions can be combined together to arrive at or come up with a complete solution to the problem. This algorithms includes Quick sort and Merge sort, they make use of Divide and Conquer paradigm.

5 0
4 years ago
Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
a_sh-v [17]
Last one I am not sure they
3 0
3 years ago
Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
Taya2010 [7]

Answer:

The answer of this question is described in the explanation part.

Explanation:

  • The connection operator will substitute unresolved conceptual addresses with the real addresses aligned with either the end system decimal parameters.
  • To do this, the modules should keep records of directives which relate to ambiguous signals.
  • In the relating, each configuration in the application framework binary is assigned a pattern of domain names.
  • This has been done, problematic connections to objects imported by this unit may be substituted in other frameworks because each other system would contain the set of instructions to be repaired for.

7 0
3 years ago
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • A​ client-server application that requires nothing more than a browser is called​ ________.
    8·2 answers
  • solve this simple question 1) Let S = {a, bb, bab, abaab} be a set of strings. Are abbabaabab and baabbbabbaabb in S*? Does any
    8·1 answer
  • Your corporation hosts a Web site at the static public IP address 92.110.30.123.
    13·1 answer
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • Q13. On which option do you click to
    12·1 answer
  • Need help ASAP??? Pick the best answers
    10·1 answer
  • Point out the wrong statement:
    7·1 answer
  • Please explain what is Ribbon?  give examples​
    7·2 answers
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!