1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
5

Need help not sure if I’m correct

Computers and Technology
1 answer:
77julia77 [94]3 years ago
8 0

Answer:

First and the second option

You might be interested in
Badin Industries runs a web application that processes e-commerce orders and handles credit card transactions. As such, it is su
Novay_Z [31]

Answer:

The correct option is C.

Explanation:

As Badin Industry is using the Payment Card Industry Data Security Standard (PCI DSS) which required the scan to be be done at least annually if there is no change in the application and when the application is changed.

In this context, provided there is no application change the minimum requirement for the scan is once in the year thus the correct option is C.

7 0
3 years ago
Read 2 more answers
4. Written record of all transactions in your checking account
Pachacha [2.7K]

Answer:

D) Checkbook register

Explanation:

8 0
3 years ago
Read 2 more answers
When information about a person remains on the internet indefinitely it is known as?
maks197457 [2]
<span>When information about a person remains on the internet indefinitely it is known as digital footprint. 
</span>A digital footprint is all of the information on-line about a person posted by that person or others,<span>intentionally or unintentionally.
</span><span>Protecting what is added to your digital footprint is very important.</span>
7 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
What additive keeps engines clean by preventing contaminates and deposits from collecting on surfaces? a. Friction modifiers b.
White raven [17]

Answer is: Dispersants


Explanation:

Dispersants keep contaminants (e.g. soot) suspended in the oil to prevent them from coagulating. Anti-foam agents inhibit the production of air bubbles and foam in the oil which can cause a loss of lubrication, pitting, and corrosion where entrained air and combustion gases contact metal surfaces.

So that's why the answer is: Dispersants

7 0
4 years ago
Read 2 more answers
Other questions:
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • What is the internet?
    5·2 answers
  • What is the decimal equivalent of the binary number 1102?
    8·2 answers
  • What processes are needed to transform a c++ program to a machine language program that is ready for execution?
    14·1 answer
  • What does intergrated organization mean
    15·1 answer
  • How can netiquette help you communicate when texting or instant messaging?
    6·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
  • Given a list of syntax errors from a compiler, a programmer should focus attention on which error(s), before recompiling?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!