1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
6

What department is cyber security

Computers and Technology
2 answers:
Paul [167]3 years ago
8 0

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

siniylev [52]3 years ago
5 0

Answer: Extra info.

It  belongs to an official government organization in the United States

Explanation:

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security....

You might be interested in
What five safety habits are you using for the internet?
forsale [732]

Answer: Keep Personal Information Professional and Limited.

Keep Your Privacy Settings On.

Practice Safe Browsing.

Make Sure Your Internet Connection is Secure.

Be Careful What You Download.

Choose Strong Passwords.

Explanation:that’s what is think

4 0
3 years ago
What is CPU<br>and it's functions<br>​
BartSMP [9]

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer

5 0
3 years ago
Read 2 more answers
Which element of a business document provides additional information but is not a part of the body of the text?
Vaselesa [24]

The subject is generally covered inside the body of text, so that one's out.

The footer is a completely separate part of the document, specifically the bottom-most portion of the page, but let's look at the others.

The salutation is placed at the beginning of the body of text.

And your closing note is placed at the end of the body of text.

So, the best answer would be b. footer.

3 0
4 years ago
Read 2 more answers
Among the aforementioned parts, the FLASH DRIVE is the most common. Why do you think a flash drive will be essential for you as
zhuklara [117]

Answer:

They can be used to store homework, presentations, research, papers, essays and etc. They can be used to hand out homework assignments, course information or notes

4 0
3 years ago
When choosing a communication channel, _____refers to the degree to which communications can be planned and recorded, thus allow
steposvetlana [31]

Answer: Control

Explanation: Communication channel is the medium created for the process of the communication.These channel let the source to destination communication in a cycle so that message can be send and received respectively.

Control in the branch of communication channel is used for the handling of the communication limit of the message that is being sent and received .It puts a limitation to the extent message can be read, recorded ,movement of resource and other facilities.

4 0
3 years ago
Other questions:
  • In microsoft word, when you highlight existing text you want to replace you are
    10·1 answer
  • Tab stops are very useful when you want to A. align text into rows. B. add space between paragraphs. C. align text into columns.
    14·2 answers
  • The CPU's control unit retrieves the next instruction in a sequence of program instructions from main memory in the ______ stage
    8·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • Which of the following barriers to oral communication is not the fault of the sender or receiver? being unprepared noise not pay
    12·2 answers
  • Which of these is an expansion slot type?
    5·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • What are three ways a person may use a computer without realizing it?
    9·1 answer
  • You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks y
    11·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!