1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
3 years ago
15

What is the positional weigh of the digit 7 in the octal number 7642 ?​

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
5 0

Answer:

111 is the answer..i hope it helps

You might be interested in
Mobile app designers who work for themselves are often dubbed _____.
aev [14]

Answer:

Appreneurs

Explanation:

An appreneur is an entrepreneur who works in the mobile device application industry and basically develop applications for the need of its own business.

5 0
3 years ago
What makes a source credible?
g100num [7]

Answer:

C It is believable or trust worthy

4 0
2 years ago
Read 2 more answers
You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
sp2606 [1]

Answer: A, it's the most professional way or C but I'd choose A

7 0
2 years ago
Por favor alguem poderia me falar qual PC e melhor: Computador Gamer Fox PC FPS Intel Core i5 8GB (GeForce GTX 1050Ti 4GB GDDR5)
Ivanshal [37]

Eu acredito no primeiro como ele tem uma GTX 1050ti, i5 e 2tb.

3 0
3 years ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Other questions:
  • How is a network printer identified on the network?
    8·1 answer
  • Technology has changed the way functions are performed in the law office. Which function has been the least affected by technolo
    10·1 answer
  • Someone who participates online for social reasons usually has a:
    9·1 answer
  • While working a night job at a call center, Eric creates an app called EatOut, which can be used to place orders at restaurants,
    14·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
    7·1 answer
  • Which is the most popular language used in game programming?
    5·2 answers
  • true or false You are able to change the formatting of a table after it is inserted into a placeholder.
    6·1 answer
  • It specifies the amount of memory needed to store data.
    7·2 answers
  • How has 5G become more energy efficient?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!