1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
4 years ago
6

a computer that no longer works after having minor repair work done to it may have been damaged by ______.

Computers and Technology
1 answer:
leonid [27]4 years ago
3 0
When repairing computers it is important to be grounded with a anti-static wrist strap because even the shock from a human body that is not grounded can produce Static Electricity which can fry the components of the computer making it inoperable.
You might be interested in
What are some things all boomers say.
lilavasa [31]

Answer: the last one ;)

Explanation:

6 0
3 years ago
Read 2 more answers
Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
nikklg [1K]

Answer:

Algorithms.

Explanation:

Computer system is an electronic machine that receives input data, processes or executes these data and outputs the results. It comprises of two parts, the hardware and software components.

The computer receives data created by a process and inputted by individuals. The software components are the operating system and the application softwares running in the operating system. The application software follows a well defined stages of task to execute a task. This is called algorithm.

The application uses the algorithm to execute the task on the input data to give the required result.

8 0
3 years ago
You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence
Lorico [155]

To deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

<h3>What is orphaned accounts?</h3>

The orphaned accounts are the accounts which do not have any valid business owner but provide the access to the services and corporate systems. One best way to deal with such account is to disable the user account.

Steps to deal with orphaned accounts-

  • Using the automated provisioning and deprovisioning can save the
  • Control the accounts with micro-certification.
  • Regular check of account to prevent the hidden access risk.

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts.

In such case, one should disable these accounts.

Thus, to deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

Learn more about the orphaned accounts here:

brainly.com/question/11211623

#SPJ1

8 0
2 years ago
XBRL: a. Is an XML-based language b. Can be read by almost any software package and easily searched by Web browsers c. All of th
Tema [17]

Answer:

c. All of these choices are correct

Explanation:

XBRL (eXtensible Business Reporting Language) is a freely available and global framework for exchanging business information which uses XML-based data tags to describe financial statements for both public and private companies. It is a normalized version of XML. It leverages efficiencies of the Internet as today’s primary source of financial information by making Web browser searches more accurate and relevant.

Therefore, options a, b and d can be identified in the above definition of XBRL. Therefore,all the choices are correct.

6 0
3 years ago
1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could
DedPeter [7]

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

6 0
3 years ago
Other questions:
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • The search text that you type is called your _____.
    11·1 answer
  • Select the examples that best demonstrate likely employers for Journalism and Broadcasting workers. Check all that apply.
    11·2 answers
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    8·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • 7.3 A hydraulic lift has a mechanical advantage of 6. If the load weighs 780 N, calculate
    13·1 answer
  • Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the m
    14·1 answer
  • What are the different parts of a word processing program?<br><br> I need this ASAP please help!!
    6·1 answer
  • Javier downloads an illustration from an online Image library and modifies it for his purposes. The illustration he downloads is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!