1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
6

______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure

.
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
5 0

SOX requirements requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Sarbanes Oxley (SOX) requires that data security policies are being made, effectively communicated and enforced. This is needed for data security as well as protecting financial data needed for normal operations.

SOX requirements are needed to be met so as to perform compliance auditing.

Find out more at: brainly.com/question/17157670

You might be interested in
What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')
nalin [4]

Answer:

index = 3

Explanation:

the find() function finds the first instance of a letter or word.

'b' = 0

'A' = 1

'n' = 2

'a' = 3

'n' = 4

'a' = 5

the first instance of 'a' in  "bAnana" is found at index location 3 computer scientist start counting from zero.

7 0
3 years ago
When first designing an app, all of the folldwing are important EXCEPT
joja [24]

Answer:

B

Explanation:

Determining how the user could interact with the app varies person to person, the others are essential to creating apps though.

4 0
3 years ago
Conformity is the acceptance of culturally approved goals and the means for achieving these goals.
docker41 [41]

Answer:

The following statement is "True".

Explanation:

Conformity acceptance word divided into two parts that are Conformity and acceptance. Conformity stands for change in behavioral change or conviction. Or considered the stress of the party. and the acceptance stands for thinking and trusting across community standards.  behaving and believing along social lines.

In other words we can say that achieving cultural goals via channels that are culturally approved and utilizing traditionally unorthodox methods to achieve cultural goals.

6 0
3 years ago
Read 2 more answers
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
3 years ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
3 years ago
Other questions:
  • hey computor guys. is the MSI B250M GAMING PRO LGA 1151 Intel B250 HDMI SATA 6Gb/s USB 3.1 Micro ATX Motherboards - Intel compat
    8·1 answer
  • What cell address indicates the intersection of the first row and the first column in a worksheet?
    15·2 answers
  •   Why does a shaded-pole motor run at a constant speed?  A. The lines of force do not change direction.  B. The current through
    15·1 answer
  • In molecular biology the "alphabet" of genes consists of four chemicals (called nucleotides) represented by the letters A C G T.
    12·2 answers
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • python Create a new qualitative variable, called Elite, by binning the Top10perc variable. We are going to divide universities i
    6·1 answer
  • Which tool determines whether or not applications, devices, and computers will work with a new operating system, while maintaini
    13·1 answer
  • Divide 111001 by 1101​
    7·1 answer
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
  • Luis saves an attachment that he received from Kevin. Where will the attachment save by default?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!