1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
A store trying to analyze the behavior of its customers will often maintaina two-dimensional array A, where the rows correspond
marusya05 [52]

Answer:

See explaination

Explanation:

Diverse Subset Problem is NP: When presented with a set of k customers, it can be checked in polynomial time that you wont at any time have two customers in the set have ever bought the same product.

Independent Set is known to be NP-complete.

Independent Set ?P Diverse Subset Problem: Suppose we have a black box for Diverse Subset Problem and want to solve an instance of Independent Set. For our Independent Set Problem, we have a graph G=(V,E) and a number k, and need to find out if G contains an independent set of size (at least) k. We need to reduce the Independent Set Problem to a Diverse Subset Problem. We do this by constructing an array where each v in V is a customer and each e in E is a product, and customer v purchased every product e for which the product edge e touches the customer node v. Then we ask the black box for the Diverse Subset Problem if there is a subset of k customers that is diverse.

The black box for the Diverse Subset Problem will return.

8 0
4 years ago
1. _____ are used to clarify code, but are not interpreted by the interpreter as commands. (1 point)
mariarad [96]

Answer:

1. D Comments

2. B False

3. C Logical Expression

8 0
4 years ago
Read 2 more answers
Your company has decided to migrate a sql server database to a newly-created aws account. Which service can be used to migrate t
MatroZZZ [7]

The service that can be used is the Database Migration Service.

<h3>What is the Database Migration Service?</h3>

A database migration service is a term used to describe a service that allows data contained in a database such as a SQL server database and the likes to a new cloud service account. The term database here denotes an organized collection of data stored electronically in a computer system.

For example, the amazon web service (AWS) database migration service falls under the category of a good tool that allows for such database transfers to a newly created AWS account. Hence, the company can use this tool to migrate the SQL server database to a newly-created AWS account.

You can learn more about database migration services from a related question here brainly.com/question/518894

#SPJ1

8 0
2 years ago
Write a public static method named insert. The insert method should have the signature insert(String[] words, String newWord, in
Mumz [18]

Answer:

Explanation:

The following code was written in Java and performs the exact requirements listed in the question. It has also been tested by the runner code and works perfectly.

public static boolean insert(String[] words, String newWord, int place) {

               if (place > words.length) {

                   return false;

       } else {

                   for (int x = words.length - 1; x >= 0; x--) {

                       if (place == x) {

                           words[x] = newWord;

                           break;

                       } else {

                           words[x] = words[x-1];

                       }

                   }

                   return true;

               }

   }

5 0
3 years ago
Do you think tracking your screen time will reduce your usage? Why or Why not?
dezoksy [38]

Answer:

I dont think it will help much

Explanation:

Well, just tracking it will not necessarily make you stop. I would recommend putting app limits or downtime (if you have a mac). Also make a log. Write down how much time you need for different things, like 1 hour of free time, 5 hours of schoolwork. Also, make a schedule based off the things you put on your log.

I found doing this helped me reduce my time on screen and made me more productive.

6 0
3 years ago
Other questions:
  • How can I make a website login system with only using php?
    14·1 answer
  • A(n) ______of the audio or video clip makes the content easily accessible to people with hearing disabilities.
    10·2 answers
  • Algorithms may be inefficient when used by a human brain.Answers:a. Algorithms can take in a relatively small amount of informat
    13·2 answers
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • Who Has any idea How to code?
    7·2 answers
  • What is the correct keyboard shortcut to cut a cell value
    15·1 answer
  • Which validation method would you use for first name on a data form
    15·1 answer
  • What are the differences between barcode reader and biometric input device
    7·1 answer
  • A combined counting and logical looping statement may be needed in the following situations: (a). The values stored in a linked
    7·1 answer
  • In the evolution of the internet, which event occurred most recently?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!