1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
3 years ago
7

1.Discuss why this class is important (or not) to a soon-to-be security practitioner. 2.Discuss one of more subjects you have le

arned so far in this class that was new to you, and how will this information help you in the future. 3.Building on question 2, how did this information help you to better understand information security. 4.Discuss some challenges you experienced/observed so far in this class. Do you have any recommendations for me to improve the content
Computers and Technology
1 answer:
KIM [24]3 years ago
8 0

Answer:

I just can't make out the question

You might be interested in
Computers use two different types of memory to operate.
Julli [10]
I only know one which is GB. This is used to store data lie files, software updates, pictures and that kind of thing.
4 0
4 years ago
Read 2 more answers
What color pixels are used in a camera?
Murljashka [212]
Red, blue, and green color pixels are used in a camera
3 0
3 years ago
Read 2 more answers
what could backupdocs.com documents backup pdf program handle at one point if at all backupdocs.com functions documents saving p
bekas [8.4K]
This don’t make sense?? But I think it can handle it aha
6 0
3 years ago
The ____ job functions and organizational roles focus on protecting the organization's information systems and stored informatio
dalvyx [7]

Answer:

Option B i.e., Information security management and professionals is the correct option.

Explanation:

They performs the work duties and operational responsibilities focus on supporting the information systems of the corporation and information stored against threats. IMS is a set of principles and protocols for the structured handling of sensitive information within an enterprise. An ISMS helps to eliminate risks and maintain continuity of operation through pro-actively minimizing the effects of a breach of security.

5 0
4 years ago
What is the output of the following C++ code?
SVETLANKA909090 [29]

Answer:

Your not including anything in your code.

Explanation:

According to your text all you have is #include. You didn't incldue any directives so you will get a error.

6 0
3 years ago
Other questions:
  • What is the expected number of jacks-or-better cards in a five-card hand?
    10·1 answer
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • Ports that are generally used to establish outbound connections are known as ___ ports.
    14·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • In what way can an employee demonstrate commitment?
    15·2 answers
  • Does watching Beastars make me a furry? ​
    12·1 answer
  • ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE
    14·2 answers
  • What does a black box represent in the system input/output model?.
    7·1 answer
  • Is there a way to delete a question on brainly?
    8·2 answers
  • You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!