1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
2 years ago
5

What do you think about the difference and similarities between the process of information security system implementation verse

an information system implementation?
Computers and Technology
1 answer:
allochka39001 [22]2 years ago
6 0

Answer:

My take on the difference and similarities between the process of information security system implementation and an information system implementation is:

A strong information security program is a fundamental part of maintaining a business in the computerized age when the quantity of information breaks and security occurrences are expanding dramatically. Without a security program, you leave your organization, clients, and information in danger. We should investigate the segments of a data security program, and stroll through a bit by bit direct on how you can execute one at your association.

Explanation:

The fundamental objective inside an association while executing an information system is to expand productivity in association action by methods for IT.

For instance: programmed data handling, satisfactory data and report the executives

You might be interested in
Traceroute would be best suited for which of the following tasks?
sleet_krkn [62]
The answer is A, or Locating bottlenecks in a network.
3 0
2 years ago
Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
boyakko [2]

Answer:

Option 1: May crash at runtime because it can input more elements than the array can hold

Explanation:

Given the code as follows:

  1.        int[] a = {1, 3, 7, 0, 0, 0};
  2.        int size = 3, capacity = 6;
  3.        int value = cin.nextInt();
  4.        while (value > 0)
  5.        {
  6.            a[size] = value;
  7.            size++;
  8.            value = cin.nextInt();
  9.        }

From the code above, we know the <em>a</em> is an array with six elements (Line 1). Since the array has been initialized with six elements, the capacity of the array cannot be altered in later stage.

However, a while loop is created to keep prompting for user input an integer and overwrite the value in the array started from index 3 (Line 4- 9). In every round of loop, the index is incremented by 1 (Line 7). If the user input for variable <em>value</em> is always above zero, the while loop will persist.  This may reach a point where the index value is out of bound and crash the program. Please note the maximum index value for the array is supposedly be 5.  

8 0
3 years ago
5 steps in cleaning and sanitizing smokehouse​
topjm [15]

Answer:

  1. Scrape or remove food bits from the surface.
  2. Wash the surface.
  3. Rinse the surface.
  4. Sanitize the surface.
  5. Allow the surface to air-dry.

Explanation: These are steps for cleaning and sanitizing.

4 0
3 years ago
The envelope method, notebook and pencil, and online software are all methods of ______.
coldgirl [10]

Answer:

communication

Explanation:

5 0
3 years ago
Read 2 more answers
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • What is the first step in the exchange between a web browser and a database?
    7·1 answer
  • Which of the following is NOT a web browser?<br> Safari<br> Chrome<br> Bing<br> Firefox
    8·2 answers
  • How would a designer interpret the word denier?
    12·2 answers
  • Is full dive vr possible and can we accomplish it with today’s technology? Explain why
    13·2 answers
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • How to code on python
    8·2 answers
  • Plz help<br> What is an ASCII?
    10·2 answers
  • /*this function represents
    8·2 answers
  • Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!