1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
14

I re-made the human version of Daddy Dearest from Friday Night Funkin

Computers and Technology
2 answers:
ZanzabumX [31]3 years ago
8 0

Answer:

to me the first one looks great! i love ur drawings :)

Explanation:

schepotkina [342]3 years ago
6 0
I like the second one better xx
You might be interested in
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
sweet-ann [11.9K]

Answer:

yoooo nba BAD BAD

Explanation:

3 0
3 years ago
Which of the following will display a string whose address is in the dx register: a.
worty [1.4K]

Answer:

a)

Explanation:

Function 9 of interrupt 21h is display string.

8 0
3 years ago
Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] > A[j] and i <
AysviL [449]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

int inversions(int a[], int low, int high)

{

int mid= (high+low)/2;

if(low>=high)return 0 ;

else

{

int l= inversions(a,low,mid);

int r=inversions(a,mid+1,high);

int total= 0 ;

for(int i = low;i<=mid;i++)

{

for(int j=mid+1;j<=high;j++)

if(a[i]>a[j])total++;

}

return total+ l+r ;

}

}

int main() {

int a[]={5,4,3,2,1};

printf("%d",inversions(a,0,4));

  return 0;

}

Check the output in the below attached image.

5 0
3 years ago
What is a detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy
Sonbull [250]

Answer:

"Compliance audit " seems to be the correct answer.

Explanation:

  • A compliance or enforcement audit seems to be a systematic analysis of the conformity of such an agency to the reporting requirements and guidelines.
  • In a compliance audit, independent auditors determine the extent and completeness of enforcement plans, security protocols, user authentication, including risk management framework.
8 0
3 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
Other questions:
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • Write a C++ program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total.
    11·1 answer
  • A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user pow
    12·1 answer
  • An assignment notebook works in conjunction with
    7·2 answers
  • What can provides access to the only menu in office 2007​
    13·1 answer
  • Drag each label to the correct location on the image.
    7·1 answer
  • Hardware refers to programs and protocols used on a computer system.<br><br> True<br> False
    8·2 answers
  • I am a mouse, but im not a mouse.<br><br> What am I?
    12·1 answer
  • Can you help me with Computer issues graphic organizer?<br> Will give out brainly
    6·1 answer
  • Some elementary particles are positively or negatively
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!