1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
7

The reaction time of a driver to visual stimulus is normally distributed with a mean of 0.4 seconds and a standard deviation of

0.05
Computers and Technology
1 answer:
Alex Ar [27]3 years ago
6 0

Answer:

<em>The reaction time of a driver to visual stimulus is normally distributed with a mean of 0.4 seconds and a standard deviation of 0.05 seconds. What is the reaction time that is exceeded 90% of the time? = −1.28, so x = 0.05 × (−1.28) + 0.4=0.336.</em>

Explanation:

correct me if im wrong please

You might be interested in
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
Ray Of Light [21]
I choose Home and it’s a good thing to have
5 0
3 years ago
Who want to go on scratch<br> I really need people to favorite and like my projects
mariarad [96]

Answer:

Sure

Explanation:

6 0
3 years ago
Read 2 more answers
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could
DedPeter [7]

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

6 0
3 years ago
8. Lael wants a quick way to look up students by their Student ID.
enyata [817]

Answer:

IFERROR(VLOOKUP(Q2,A2:N31,2,FALSE),"Invalid Student ID")

Explanation:

The VLOOKUP function is expresses using the syntax :

=VLOOKUP(value, table array, col_index, range lookup value)

Using the IFERROR function with the VLOOKUP :

IFERROR(VLOOKUP(Q2,A2:N31,2,FALSE),"Invalid Student ID")

The VLOOKUP function here is nested with an IFERROR function is used to avoid our calculation or output resulting or showing an error and instead of throwing an error, output a statement which is defined by the user.

Here, the IFERROR function here takes the VLOOKUP function defined as its first argument, the second argument will be the output if the VLOOKUP function fails to find a match

8 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • A microphone is a type of electronic.<br><br> True/Faulse
    14·1 answer
  • I need<br> Help do my homework because I don’t understand
    11·2 answers
  • A Trojan horse:
    6·1 answer
  • Each professional association has
    7·1 answer
  • The purpose of a good web page design is to make it
    9·2 answers
  • Aside from human user types, there are nonhuman user groups. Known as account types, __________ are implemented by the system to
    10·1 answer
  • Write any two rules for writing algorithm​
    10·1 answer
  • i have a subscription under the name JaysonxH14, my email was never saved under the apple automatic password save. i cant figure
    14·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!