1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
8

What is cyber security ???​

Computers and Technology
1 answer:
mestny [16]3 years ago
8 0

Answer:

Cyber security is the practice if defending computers,servers,mobile devices,electronic systems, networks, and data from malicious attacks

You might be interested in
Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
pantera1 [17]
Use tab key & shift+$
6 0
4 years ago
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
4 years ago
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any in
irina1246 [14]

Answer:

Project Identification

Provide the identifying information associated with the project, including the applicable project control code, system acronym, and system title.

System Proponent

Provide the name of the System Proponent.

History of the System

Briefly describe the system’s history and predecessor, if any.  State the mission needs and information requirements, including how the system is expected to help users.

Functional System Description and Data Usage

Briefly describe what the system does functionally and how the data are used by the system.

Explanation:

Overview

The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months).  The objectives are to determine if the system does what it is designed to do: Does it support the user as required in an effective and efficient manner? The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system.  The review results can be used to strengthen the system as well as system development procedures.

The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system.  A representative from the functional development group or other member of the major user organization participates in the review.  The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible.

The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing end users and their managers, system administrators, and computer operations personnel.  The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to initiate other actions.

The Post-Implementation Review is a free-form report, and not all sections are relevant or necessary to the final product.  A description of the Post-Implementation Review Report is attached.

3 0
3 years ago
1.) How do parks and other green spaces benefit a community?
vagabundo [1.1K]
#1 is A and #2 is B, but I don't know about #3 and #4.
8 0
3 years ago
A power ratio of 9000000:1 corresponds to ... dB?
sertanlavr [38]

Answer:

69.54

Explanation:

A power ratio of 9000000:1 corresponds to 69.54 dB.

The calculation is presented below:

Formula for calculating Power ratio (db) = 10 * log [P(out)/P(in)]

Since the given ratio is 9000000:1, substituting in the formula gives us 10 * log (9000000/1)

Note that log 9000000 = 6.954

Therefore, 10 * log (9000000/1) = 69.54

Hence the required power ratio in db is 69.54 db.

4 0
4 years ago
Other questions:
  • The more resources you have to choose from during an open book test, the better you will do on the test because more
    13·1 answer
  • Which of the following would a high school graduate interested in the performing arts most likely do after graduation?
    10·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • The _________ unit, within the CPU, interprets software instructions and literally tells the other hardware devices what to do,
    5·1 answer
  • _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th
    11·1 answer
  • A nonprofit organization uses a contact management database to track donations, amounts donated, and all correspondence and phon
    11·1 answer
  • Software is the word for:
    15·1 answer
  • I NEED HELP QUICK
    9·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • What is a limitation of 5G mmWave, despite its high speed?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!