There must be security policies in place to set core standards and requirements when it comes to encrypted data.

a. True
b. False

Answers

Answer 1
You’re best answer has to be A

Related Questions

Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining

Answers

Answer:

The answer is "Option b".

Explanation:

Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.

How should you mark the query if it is a valid one?
A) Gibberish or Vague
B) Profane
C) Foreign Language
D) Valid
E) None

Answers

Answer:

None

HOPE IT WILL HELP YOU.

MARK THE ANSWER BRAINLIST

how do you get The special and extended ending in final fight 2 snes

Answers

Yes what that person above said!

Microsoft created Adobe Photoshop? TRUE FALSE​

Answers

Answer:

false the creator of adobe photoshop was microsoft adobe photoshop is a popular photo editing software which was developed by a company named as adobe inc.

Answer:

Photoshop is created by Adobe, and Adobe is an independent company started by Jhon Warnockand.

i need an introduction of apple and microsoft

Answers

During the first Macintosh's development and early years of production, Microsoft was a critical Apple ally. The software pioneer created important programs for Apple's PC in the early '80s. ... Jobs lashed out at Gates during a meeting later that same year and equated Microsoft's plans for Windows to theft.

write a program that keeps taking integers until the user enters in python

Answers

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

Which of the following are examples of third party software that banks use? (Select all that apply.)
A -compliance reporting
B -unencrypted Microsoft Suite
C -accounting software
D -customer relationship management

Answers

Answer:

c , it is a correct answer for the question

Highlight and detail two ways that you can use Excel to make you more efficient as a college student.
You can consider such things as study schedules, school supply lists, or grade books (among many other options), but make sure to describe each in a way that is personal to your academics.

Answers

Answer:

Technological advances can create enormous economic and other benefits, but can also lead to significant changes for workers. IT and automation can change the way work is conducted, by augmenting or replacing workers in specific tasks. This can shift the demand for some types of human labor, eliminating some jobs and creating new ones.

Explanation:

10. Question
What are the drawbacks of purchasing something online? Check all that apply.

Answers

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

There are many drawbacks of purchasing online, some of them are as follows,

Chance of pirated item in place of genuine product.Chances of fraud during digital purchase and transaction.Product not deliver on time as expected.Not getting chance to feel the product before purchase.

These are some of the drawbacks of purchasing something online.

Learn more: https://brainly.com/question/24504878

which technique is the best to help you manage time better ​

Answers

Answer:

Make a schedule and select certain times to do certain things so that you could have time for more things.

Explanation:

I did the same thing now I can make time for myself.

Explain how data structures and algorithms
are useful to the use of computers in
data management (10 marks)


Explain how data structure and uses of computer in data management

Answers

Answer:

Data management is a important tool for data handling.

Explanation:

A good knowledge about the data stricture and data management is a prerequisite for working with codes and algorithms. It helps to identify the techniques for designing the algorithms and data storage in the system. It helps to find out the data hierarchy. Thereby allowing the data management in an efficient and effective way. It can increase the skills in computer programming

What is the different type of secondary memory of a computer system.? explain

Answers

Explanation:

Solid state storage devices

optical storage devices

magnetic storage devices

Definition of my computer​

Answers

Answer:

a programmable electronic device designed to accept data

Explanation:

a programmable electronic device designed to accept data

A programmable divce

2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char

Answers

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

what is tha length of Mac address ?​

Answers

Answer:

short length which includes all details about the addres

why am i doing the investigation​

Answers

Because it’s your interest

2) What are three categories of computer languages? 3) Write four components of a QBASIC window. 4) What are the three types of operators in QBASIC? 5) What is the use of connector symbol in flowchart? 6) What is a computer network? 7) State two uses of Internet. 8) Write three examples for web browser. 9) Name some popular ISPs in Sri Lanka. 10) Differentiate between MAN and PAN.​

Answers

Answer:

2: assembly language , machine language and high level language

3: a character set , constants , variables , statements , operators and expressions

3. A 3D model of a designed product would be used to communicate the

Answers

Answer:

A 55

Explanation:

A 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

What is 3D?

It should be noted that 3D modeling is the process if developing a coordinate representation of an object.

In this case, a 3D model of a designed product would be used to communicate the photorealistic renditions of the product.

Learn more about 3D on:

brainly.com/question/26350554

#SPJ2

Write a program that creates an an array large enough to hold 200 test scores between 55 and 99. Use a Random Number to populate the array.Then do the following:1) Sort scores in ascending order.2) List your scores in rows of ten(10) values.3) Calculate the Mean for the distribution.4) Calculate the Variance for the distribution.5) Calculate the Median for the distribution.

Answers

Answer:

Explanation:

The following code is written in Python. It uses the numpy import to calculate all of the necessary values as requested in the question and the random import to generate random test scores. Once the array is populated using a for loop with random integers, the array is sorted and the Mean, Variance, and Median are calculated. Finally The sorted array is printed along with all the calculations. The program has been tested and the output can be seen below.

from random import randint

import numpy as np

test_scores = []

for x in range(200):

   test_scores.append(randint(55, 99))

sorted_test_scores = sorted(test_scores)

count = 0

print("Scores in Rows of 10: ", end="\n")

for score in sorted_test_scores:

   if count < 10:

       print(str(score), end= " ")

       count += 1

   else:

       print('\n' + str(score), end= " ")

       count = 1

mean = np.mean(sorted_test_scores)

variance = np.var(sorted_test_scores, dtype = np.float64)

median = np.median(sorted_test_scores)

print("\n")

print("Mean: " + str(mean), end="\n")

print("Variance: " + str(variance), end="\n")

print("Median: " + str(median), end="\n")

what was the main purpose of napiers bone?​

Answers

Answer:

Napier's bones is a manually-operated calculating device created by John Napier of Merchiston, Scotland for the calculation of products and quotients of numbers. The method was based on lattice multiplication, and also called 'rabdology', a word invented by Napier.

Answer:

The main purpose of napiers bone is to fine products and quotient of divisions.

Create union floatingPoint with members float f, double d and long double x. Write a program that inputs values of type float, double and long double and stores the values in union variables of type union floatingPoint. Each union variable should be printed as a float, a double and a long double. Do the values always print correcly? Note The long double result will vary depending on the system (Windows, Linux, MAC) you use. So do not be concern if you are not getting the correct answer. Input must be same for all cases for comparison Enter data for type float:234.567 Breakdown of the element in the union float 234.567001 double 0.00000O long double 0.G0OO00 Breaklo n 1n heX float e000000O double 436a9127 long double 22fde0 Enter data for type double :234.567 Breakdown of the element in the union float -788598326743269380.00OGOO double 234.567000 long double 0.G00000 Breakolon 1n heX float 0 double dd2f1aa0 long double 22fde0 Enter data for type long double:

Answers

Answer:

Here the code is given as follows,

#include <stdio.h>

#include <stdlib.h>

union floatingPoint {

float floatNum;

double doubleNum;

long double longDoubleNum;

};

int main() {

union floatingPoint f;

printf("Enter data for type float: ");

scanf("%f", &f.floatNum);

printf("\nfloat %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type double: ");

scanf("%lf", &f.doubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type long double: ");

scanf("%Lf", &f.longDoubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

return 0;

}

Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS

Answers

Answer:

Option A (IDS) is the correct choice.

Explanation:

Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.

All other three alternatives are not related to the given query. So the above option is correct.

Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.

Design the dictionary so that it could be useful for something meaningful to you. Create at least three different items in it. Invent the dictionary yourself. Do not copy the design or items from some other source.

Next consider the invert_dict function.

def invert_dict(d):
inverse = dict()
for key in d:
val = d[key]
if val not in inverse:
inverse[val] = [key]
else:
inverse[val].append(key)
return inverse

Modify this function so that it can invert your dictionary. In particular, the function will need to turn each of the list items into separate keys in the inverted dictionary.
Run your modified invert_dict function on your dictionary. Print the original dictionary and the inverted one.
Describe what is useful about your dictionary. Then describe whether the inverted dictionary is useful or meaningful, and why.

Answers

Answer:

Explanation:

# name : [animal type, age, sex]

animal_shellter = {

 "Teddy": ["dog",4,"male"],

 "Elvis": ["dog",1,"male"],

 "Sheyla": ["dog",5,"female"],

 "Topic": ["hamster",3,"male"],

 "Kuzya": ["cat",10,"male"],

 "Misi": ["cat",8,"female"],

}

print(animal_shellter)

print("")

def invert(d):

 inverse = dict()

 for key in d:

   val = d[key]

   for item in val:

     if item not in inverse:

       inverse[item] = [key]

     else:

       inverse[item].append(key)

 return inverse  

inverted_shellter = invert(animal_shellter)

print(inverted_shellter)

Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.

Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?

Answers

Please send pics and than I sent you lol I wanna wanna play with you lol but I’m gonna play play with this girl and play with me ur mommy mommy play good day bye mommy bye love.

College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away

Answers

Answer:

Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...

Browse Online Tutorials. ...

Build-up online profile. ...

Learn new Tools. ...

Implement what you learned. ...

Enrich your skillset. ...

Try-out and Apply.

Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isn’t useful to them. Which key issue mentioned in the textbook did Mario fail to consider?

Answers

Answer:

Audience knowledge level

Explanation:

The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.  

Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.

please help!....................

Answers

Answer:

Based on what the graph does on the number line, I would say 1100110

Every time the graph spikes up, that is a one, otherwise it is a zero.

Explanation:

111+ 11- 1


1111+1111




1101 +1101


1010-11​

Answers

Answer: 121, 2222, 2202, 999

Explanation:

Answer:

a. 121

b. 2222

c. 2202

c. 999

1. Which Property is used for changing the background color of any control
a) Font color b) Back color c) Text color d) color back

Answers

'Back Color' is characterized as the CSS property that is employed to modify or alter the background color belonging to any element of control.

B). 'Back Color' is the property that is used for altering the background color.

However, it excludes the margin area of the element and includes the entire size of the element along with the filler. One can select the color of his/her choice in order to promote the readability of the text by contrasting the background color to the text color. Thus, option B is the correct answer.

Learn more about 'CSS properties' here:

brainly.com/question/2671236

You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.

Answers

Answer:

I will fix it by my mind by thinking

Based on the above scenario, the steps to take is given below\

What is the management about?

The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.

Later you Disable the network adapter  and then Update the driver .

Learn more about Ethernet from

https://brainly.com/question/1637942

#SPJ2

Other Questions
What are the uses of magnetic force? 8.113 as a fraction PLEASE HELP ME 2sin^2(2x) + 1 = 3sin(2x) Solve for x with exact answers. The domain is 0 x Write the equation in standard form.x2 + 6 = 5x A mitosis inhibitor is a medication that is designed to prevent mitosis in certain cells. Why would these be helpful in the treatment of tumors Rewrite incorrect sentencesNothing interesting has happened in past couple of weeks. Which equation represents the slope-intercept form of the line below?y-intercept = (0, 2)slope 3/7. find x. A. 212 B. 7 C. 213 over 2 D. 212 over 2 1.What is laser?2.List the uses of laser in everyday life Question 1 of 10Consider the following geometric solids.A sphere with a ratio of surface area to volume equal to 0.3 mA right circular cylinder with a ratio of surface area to volume equal to2.1 m?What results would you expect if these two models were compared in adiffusion test?A. The rate of diffusion would be slower for the right cylinder,B. The rate of diffusion would be the same for the two models.0C. The rate of diffusion would be faster for the right cylinder.D. The rate of diffusion would be faster for the sphere. Factorize no g, h, j, k, m, n Help me plss.. I already give the picture... what are you most likely to find on a health website? Use the slope-intercept form of the linear equation to write an equation of the line with given slope and y-intercept.Slope: -6/5 y intercept (0,8) What happens when you drop a tv tray on your foot and it bruises and you can feel the bone more than normal? a rational number between 11 and 12 1. Find the mistake in this sentence and correct it No one have gotten such high marks in writing compositions beforeA . HaveB . SuchC . WritingD . Before a/ that/ flower/beautiful/ is /red/ tiny Refer to Source A and Source B. Compare how the writers present their different perspectives on the national rail disasters they describe. About 12.5% of restaurant bills are incorrect. If 200 bills are selected at ran- dom, find the probability that at least 22 will contain an error. Is this likely or unlikely to occur