1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
10

Preventive security has which of the following advantages over reactive security:

Computers and Technology
1 answer:
igomit [66]3 years ago
3 0

Answer:

Don't know

Explanation:

You might be interested in
The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
denpristay [2]

Answer:

The answer is Letter D.

Explanation:

The introduction of new information technology has a ripple effect raising new ethical, social, and political issues. There are five main moral dimensions that tie together ethical, social, and political issues in an information society.

8 0
4 years ago
As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put
tresset_1 [31]

Answer:

d. His own

Explanation:

John is the JAD project leader

Joint Application Development (JAD) is a process that accelerates the design of information technology solutions. JAD uses customer involvement and group dynamics to accurately depict the user's view of the business need and to jointly develop a solution.

The executive sponsor is the person from the customer's organization who has the ultimate authority to make decisions about the project. The sponsor may be the customer's project leader, the CIO, or, in some cases, the CEO. The facilitator works with the sponsor to get the project started; it is essential, however, that the sponsor make key decisions, not the facilitator.

The executive sponsor has the following responsibilities:

. Accept ultimate authority and responsibility for the functional area to be addressed by the system.

· Resolve business policy conflicts by being the ultimate decision? maker.

· Honor the results of the JAD process.

· Set the vision for the project.

· Ensure the project team has access to and commitment from the right business user experts.

· Communicate customer support and cooperation.

6 0
3 years ago
Write the code to call a function named send_variable and that expects a single int parameter. Suppose a variable called x refer
NemiM [27]

Answer:

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>//function definition</em>

<em>void send_variable(int num){</em>

<em>    cout<<"The Number is "<<num<<endl;</em>

<em>}</em>

<em>// main function begins here</em>

<em>int main()</em>

<em>{</em>

<em>    int x =15; //declares an it variable and assigns 15</em>

<em>    // Calls the function send_variable</em>

<em>    send_variable(x);</em>

<em>    return 0;</em>

<em>}</em>

Explanation:

Using C++ programming language we created the function called send_variable and in the main function we call this function which only displays the value of an int variable passed unto it.

6 0
3 years ago
In addition to using the icons to adjust page margins, a user can also use _____.
Elenna [48]

The shift button, space,or the tab.

4 0
3 years ago
Read 2 more answers
In a PC, which of the following components stores the BIOS
LiRa [457]
I think it’s rom because rom chip is on the PC mother chip
5 0
3 years ago
Other questions:
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • Bryan knows that it takes him fifteen minutes to drive to work, or twenty minutes if every traffic light is red on the way there
    14·2 answers
  • Which of the following is a domestic business activity?
    6·2 answers
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • What is different between attaching a file on an email program versus a smartphone?
    12·2 answers
  • You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
    9·1 answer
  • A device that allows multiple computers to communicate with each other is
    9·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    13·1 answer
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • Pls answer dis question when i'm not connected and i open bluestacks 5 it will be working but if i am connected it wil not work
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!