1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
13

In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a

reas. What is not one of the areas?
Computers and Technology
1 answer:
Ugo [173]3 years ago
4 0

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

You might be interested in
Explain the purpose of Data Layer, in the Layered modelfor web applications?
matrenka [14]

Answer:

Purposes of Data Layer, in the Layered model for web applications are as following:-

1. The data Layer,is the third layer and it takes care of the all the operations concerning the database level.

2. This data layer gets a command from the application layer to send a query to the database and will process this command according to the type of database that is used.

3. It will ensure that the correct connections to the database are set.

4. It is represented by the Database.

7 0
3 years ago
Write a program that helps a young student learn to make change. Use the random number generator to generate change amounts betw
erastovalidia [21]

Answer:

#include <iostream>

#include <stdlib.h>

using namespace std;

int main()

{

srand(time(0));

 

int coins = rand()%99 + 1;

int temp = coins;

cout<<"Enter the coins needed to make $0."<<coins<<"?"<<endl<<endl;

int a, b, c, d;

cout<<"Quarters? ";

cin>>a;

cout<<"Dimes? ";

cin>>b;

cout<<"Nickles? ";

cin>>c;

cout<<"Pennies? ";

cin>>d;

 

int quarters = coins/25;

 

coins = coins%25;

 

int dimes = coins/10;

 

coins = coins%10;

 

int nickles = coins/5;

coins = coins%5;

 

int pennies = coins/1;

 

if(((a*25) + (b*10) + (c*5) + (d*1))==temp)

{

cout<<"That's correct"<<endl;

 

if(a!=quarters || b!=dimes || c!=nickles || d!=pennies)

{

cout<<"The optimized solution is "<<endl;

}

}

else

{

cout<<"Not correct"<<endl;

cout<<"The solution is "<<endl;

 

}

 

cout<<"\tQuarters: "<<quarters<<endl;

cout<<"\tDimes: "<<dimes<<endl;

cout<<"\tNickles: "<<nickles<<endl;

cout<<"\tPennies: "<<pennies<<endl;

return 0;

}#include <iostream>

#include <stdlib.h>

using namespace std;

int main()

{

srand(time(0));

 

int coins = rand()%99 + 1;

int temp = coins;

cout<<"Enter the coins needed to make $0."<<coins<<"?"<<endl<<endl;

int a, b, c, d;

cout<<"Quarters? ";

cin>>a;

cout<<"Dimes? ";

cin>>b;

cout<<"Nickles? ";

cin>>c;

cout<<"Pennies? ";

cin>>d;

 

int quarters = coins/25;

 

coins = coins%25;

 

int dimes = coins/10;

 

coins = coins%10;

 

int nickles = coins/5;

coins = coins%5;

 

int pennies = coins/1;

 

if(((a*25) + (b*10) + (c*5) + (d*1))==temp)

{

cout<<"That's correct"<<endl;

 

if(a!=quarters || b!=dimes || c!=nickles || d!=pennies)

{

cout<<"The optimized solution is "<<endl;

}

}

else

{

cout<<"Not correct"<<endl;

cout<<"The solution is "<<endl;

 

}

 

cout<<"\tQuarters: "<<quarters<<endl;

cout<<"\tDimes: "<<dimes<<endl;

cout<<"\tNickles: "<<nickles<<endl;

cout<<"\tPennies: "<<pennies<<endl;

return 0;

}

Explanation:

  • Use the built-in rand function to generate a random coin.
  • Get all the required values for quarters, dimes, nickles and pennies and store them in variables.
  • Check if the coins give a value of temp, then answer is correct and the values of user will be added.
  • Optimum solution is displayed  If it does not matches with the optimum solution. Display that the answer is wrong along with solution.
6 0
3 years ago
Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following
Lesechka [4]

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.

4 0
4 years ago
Brian would like to automatically check the spelling in a presentation. To do this, he should select which of the following tabs
Law Incorporation [45]
Brian would need to select tab D. Review
7 0
3 years ago
Read 2 more answers
How has the manufacturing process of cell phones evolved over time? What factors have influenced these changes? *
kicyunya [14]

Answer:

Cellphones have evolved rapidly since handheld mobile phones first appeared in the 1970s. ... Generally, phones have evolved to be more compact, to have longer battery life and to allow addition of features beyond making calls, like running apps and sending text messages.

Explanation:

7 0
4 years ago
Other questions:
  • What's the ASCII code for boy ?
    15·1 answer
  • What type of product does amd manufacture
    5·1 answer
  • Using an array, double each of the following values and print each result: values = [1.1, 10, 4.55, 30004, 0.2]
    7·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • Is instant messaging a form of synchronous communication
    10·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • Write a program that allows the user to play a guessing game. The game will choose a "secret number", a positive integer less th
    14·1 answer
  • Each tab is divided into groups of related commands or buttons. T or F
    10·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!