1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
2 years ago
7

40 points for this question

Computers and Technology
2 answers:
julsineya [31]2 years ago
6 0

Answer:

-promoting the common good

-helping and leading others

targeting potential cyber criminals

Explanation:

got it correct on edge!

qaws [65]2 years ago
3 0

Answer:

I think the answers are

<h3>the second one </h3><h3>the third one </h3><h3>the fourth one </h3>

hope it helps!

You might be interested in
Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what wi
devlian [24]
Sort ascending would be the correct one, since you are going from the lowest value to the highest
3 0
3 years ago
Read 2 more answers
A ____ is a copy that is kept in case values need to be restored to their original state.
Zepler [3.9K]
A backup is the copy made in this case
5 0
4 years ago
What can you do with youtube red that you cant do with a normal account?
ipn [44]
No, Ad's. Extra Videos Created By Youtube, and thats about it lol oh and you can play the audio in the background of your phone, like lets say your listening to some music on youtube, and you want to play a game on your phone while listening to that tune on youtube, i just said screw youtube, i jailbroke my device and i have 20X more control of my youtube setting, etc.. and plus i can do more without youtube red tbh lol.
7 0
3 years ago
Read 2 more answers
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Identify the statement below that is not true of the 2013 COSO Internal Control updated framework. a. It provides users with mor
gladu [14]

Answer:

C. It adds many new examples to clarify the framework concepts.

Explanation:

COSO is short for Committee of Sponsoring Organizations of the TreadWay Commission.The original framework released by COSO was the Internal Control-Integrated Framework, published in the year 1992. The purpose of this framework is to help in establishing effective internal control in businesses.

The updated framework was published in the year 2013. The purpose of this updated frame work includes;

  • helping businesses in establishing an effective and efficient internal control system that would help them in the implementation and documentation of issues affecting their businesses.

  • It also provides users with more precise guidelines which does not take away from the original framework, but rather builds on it.
6 0
3 years ago
Other questions:
  • A company wants to build a webpage that displays KPIs that can be derived from values in datasets stored in Einstein Analytics.
    6·1 answer
  • Text filters allow you to create a custom filter to match ________ the text in a field that you specify.
    7·1 answer
  • Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power
    7·1 answer
  • I need help someone please help
    6·1 answer
  • Read the paragraph.
    12·2 answers
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
    7·1 answer
  • If you get a flat tire on the side of the road, what do you do.
    6·1 answer
  • Why is failure an important part of life and the engineering design process?
    13·2 answers
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!