1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
balu736 [363]

High deductible plan is referred to those insurance plans in which an individual has to pay the least out of their pocket and in return, the claim amount is more.

It is somewhat similar to traditional healthcare insurance but it too has slight differences.


7 0
3 years ago
Read 2 more answers
Explain how the organ systems work together to warm up the body on a cold day
Tatiana [17]

Answer:

Your body is to cold ,blood vessels in the skin contract , and blood flow to the extremities (arms and legs)slows . muscles contract and relax rapidly which generates  heat to keep you warm..

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
I will mark brainliest
Angelina_Jolie [31]

Answer:

specialized limitations

Explanation:

beacause the others is an application product

4 0
3 years ago
________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
Mrrafil [7]

The answer is Software.  It consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.  It is a set of instructions and related documentation that tells a computer what to do or how to perform a task or it can mean all the software on a computer, including the applications and the operating system.

5 0
3 years ago
1. Extract title Write a function extract_title that takes one parameter, the filename of a GenBank formatted file, and returns
trapecia [35]

Answer:

def extract_title(file):

   import re

   a =''

   with open(file,'r') as file:

       for line in file:

           a += line

       m = re.search("^(TITLE)(.*?)(JOURNAL)", a, re.M + re.S)

       print(m.groups()[1])

extract_title('new.txt')

Explanation:

The programming language used is python 3.

The function is first defined and the regular expression module is imported.

A variable is initialized to an empty string that will hold the content of the GenBank formatted file.

The file is opened and every line in the file is assigned to the string variable. The WITH statement allows files to be closed automatically.

Regular expression is used to capture all the files between TITLE and JOURNAL in a group.

The group is printed and the function is called.

I have attached a picture of the code in action.

6 0
3 years ago
Other questions:
  • The system restore utility can be started from command line using what executable?
    11·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    10·1 answer
  • Java public class Odds { public static void main(String[] args) { printOdds(3); printOdds(17/2); int x = 25; printOdds(37 – x +1
    12·1 answer
  • Similarities between inline css and internal css​
    6·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • Suppression of politically or socially unacceptable co
    5·1 answer
  • Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!