1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
7

Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network t

echnician, who is considering a career change to specialize in security. She asks you for advice as to whether she should self-study to become a security professional or seek formal education, such as a bachelor's degree in information security. What is your advice to Mary
Computers and Technology
1 answer:
nadya68 [22]3 years ago
6 0

Answer:

Seek a bachelor's degree.

Explanation:

Seems more compromised and education from people with experience already.

You might be interested in
here are pros and cons for doing temp work. Please select the best answer from the choices provided T F
Brut [27]

Answer:

Hello! the answer should be true, I hope i got here in time.  

Explanation:

6 0
3 years ago
Read 2 more answers
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
Write a BASIC program to find the product of any two numbers​
GuDViN [60]

Answer:

Print 4 + 4

Explanation:

If you're writing this in the programming language called BASIC, this is how you would add any two numbers.

6 0
3 years ago
Complete the following sentences by choosing the best answer from the drop-down menus.
aleksandrvk [35]

Answer:

b. Application software

Explanation:

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:

Microsoft Office Word, Excel, Powerpoint

i think i did that right:)

7 0
3 years ago
What is a logical reason why you should be able to delete your own posts on social media?
Furkat [3]

People live in the moment and post whatever they want and they just might regret it later on.

3 0
3 years ago
Read 2 more answers
Other questions:
  • How would you print from 1 to 1000
    13·1 answer
  • Oxygen-18 has an atomic number of 8. How many neutrons are in this isotope?
    7·1 answer
  • Which is a value of the Scrum Manifesto?
    9·1 answer
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • Please debug the below code in Java please.
    15·1 answer
  • Mary works for a multimedia firm, and she spends long hours on a desktop computer. Recently, she expired back pain and visited h
    12·1 answer
  • in the world of computing accessibilty most often refers to: a how quickly software opens , b password protection, c assistance
    6·1 answer
  • What function is used to return the results in column D?
    11·1 answer
  • What is a thoughtware​
    7·1 answer
  • Several small stores rent space within a larger shopping centre. The owners of the shopping centre have provided a physical netw
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!