1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
8

I'm surprised I haven't even got a single warning yet lol

Computers and Technology
1 answer:
dangina [55]3 years ago
7 0

Answer:

Thats good

Explanation:

Thanks for the points~! ;)

You might be interested in
So if i was a you tuber and i went to a very popular site and posted my channel link but i am not a very big you tuber what woul
luda_lava [24]

Answer:

10%-30%

Explanation:

depends on what site and how the site works

5 0
3 years ago
Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has
Eva8 [605]

Answer:

See attached picture.

Explanation:

See attached picture for explanation.

5 0
3 years ago
1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could
DedPeter [7]

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

6 0
3 years ago
Network architecture is the pattern in which and other devices are set up to communicate. It specifies how from one computer mov
yanalaym [24]

Answer:

1) a.-Computers

b.- cables

c.-switches

2) a.- data

b.- devices

c.- computers

4 0
3 years ago
A computer on the network that requests resources or services from another computer on the network is known as:
Rudik [331]

Answer:

Client

Explanation:

In a client-server type of network, there is powerful central computer, called a server which hosts some information or data and other kinds of resources or programs. This server is connected to a number of less powerful computers, such as desktop computers and laptop which will access the data or resources from the server. These laptops and desktops are called clients.

6 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class GasTank containing: A data member named amount of type double. A data member named capa
    13·1 answer
  • Course hero 21. say you have a /15 network address. you are asked to create subnets with at least 1,000 hosts/ subnet. what is t
    9·1 answer
  • What is the definition of Microsoft Operating System?<br>​
    8·2 answers
  • What types of storage can be used to access your data on another computer?
    10·2 answers
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • Sub to splashy
    14·2 answers
  • Write a new method in the Rectangle class to test if a Point falls within the rectangle. For this exercise, assume that a rectan
    10·1 answer
  • Choose a common cloud-based application from the lesson.(Infrastructure as a service, Software as a service, Platform as a servi
    5·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers.
    11·1 answer
  • // This pseudocode segment is intended to compute the number
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!