1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
15

Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool

should an Administrator use to get this information
Computers and Technology
1 answer:
rosijanka [135]3 years ago
4 0

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

You might be interested in
Summarize the features of several stand-alone operating systems ​
katen-ka-za [31]

Answer:

Stand-Alone Operating Systems •Microsoft Windows Mobile –Designed for smartphones and PDAs –Includes simplified versions of Windows programs –Supports handwriting recognition and voice recording –Supports synchronizing with corresponding programs on desktop computers

Explanation:

Stand-Alone Operating Systems •Microsoft Windows Mobile –Designed for smartphones and PDAs –Includes simplified versions of Windows programs –Supports handwriting recognition and voice recording –Supports synchronizing with corresponding programs on desktop computers

8 0
1 year ago
If someone you knew was considering installing Smarthome technology, would you advise that person to install it or not? How woul
jeka94
Is this helpful? I would research extensively

5 0
3 years ago
Write a program that asks the user to enter a series of numbers separated by commas. Here is an example of valid input: 7,9,10,2
alex41 [277]

Answer:

Here is the JAVA program. Let me know if you need the program in some other programming language.

import java.util.Scanner; // used for taking input from user

public class Main{ //Main class

public static void main(String[] args) {//start of main() function body

  Scanner scan = new Scanner(System.in); // creates a Scanner type object

   String input; // stores input series

    int sum = 0; //stores the sum of the series

    System.out.println("Enter a series of numbers separated by commas: "); //prompts user to enter a series of numbers separated by comma

     input = scan.nextLine(); //reads entire input series

     String[] numbers = input.split("[, ]"); //breaks the input series based on delimiter i.e. comma and stores the split sub strings (numbers) into the numbers array

   for (int i = 0; i < numbers.length; i++) { //loops through each element of numbers array until the length of the numbers reaches

          sum += Integer.parseInt(numbers[i]); } // parses the each String element of numbers array as a signed decimal integer object and takes the sum of all the integer objects

     System.out.println("Sum of all the numbers: " + sum);  } } //displays the sum of all the numbers

Explanation:

The program prompts the user to enter a series separated by commas.

Then split() method is used to split or break the series of numbers which are in String form, into sub strings based on comma (,) . This means the series is split into separate numbers. These are stored in numbers[] array.

Next the for loop iterate through each sub string i.e. each number of the series, converts each String type decimal number to integer using Integer.parseInt and computes the sum of all these integers. The last print statement displays the sum of all numbers in series.  

If the input is 7,9,10,2,18,6

Then the output is: 7+9+10+2+18+6

sum = 52

The program and its output is attached.

8 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
1.   Which of the following is an example of a primary cost of an accident or injury?
adelina 88 [10]

1. A

2. D

3. D

4. C

5. Pretty sure it’s A, I could be wrong though

6. A

7. Not sure on this one

8. Either B or D

9. A

10. C

11. D

12. C

13. C

Hope this helps a little bit

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which best compares and contrasts visual and performing arts? Both careers use communication skills; however, people involved in
    15·2 answers
  • A communications system connecting two or more computers is called a(n) ________.
    7·1 answer
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • Which line is not a computer-generated forecast?Which line is not a computer-generated forecast?the black line representing 20th
    12·1 answer
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • . An exception is an error that occurs during the execution of a program at run-time that disrupts the normal fow of the Java pr
    5·1 answer
  • Have you searched Buzz Ch.at on playstore​
    13·1 answer
  • Impact of information technology in the society​
    11·1 answer
  • What does FTTB mean?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!