What is the first step to understand the potential impact to the business about a Security threat?

Answers

Answer 1

Answer:

Identify assets and their values

Explanation:

As a security analyst, the first step to determine the potential security threat is to understand

what kind of assets needs to be protected?what is the value of such assets?


Related Questions

List two building techniques or materials that should be considered if you are building in Tornado Alley.

Answers

Have a strong foundation and a tornado shelter.

Write a program to create a list of numbers in the range of 1 to 10. Then delete all the even numbers from the list and print the final list.

Answers

>>> range (0,11,2)
[0, 2, 4, 6, 8, 10]

The syntax for ________ requires you to use a colon after every if statement and while loop.
Java
Boolean
Python
programming

Answers

don't go yo the link

What is the primary purpose of source code editor features such as keyword hi lighting and auto-completion A.to speed up the coding process B.to improve the visual appeal of the editor
C.to help programmers debug the code. D.to make coding easier for learners E.to make it easier for machines to read the code

Answers

Answer:

A

Explanation:

It's not the following because:

B- visual appeal doesn't really matter when you're getting a job done in terms of programming

C- auto completion doesn't help with debugging it just ensures there's no syntax errors in the first place

D- it could be this, but seasoned coders also use highlighting and autocompletion so I thought A would be a better fit to encompass all coders

E- the editor features doesn't impact the machine at all, it will always be converted to binary so it wouldn't make it easier at all

How can users open a shared worksheet if they do not have Excel installed on a computer? visit Microsoft’s website use Office365’s home page open a PDF version for editing use Excel Online through the 365 portal

Answers

Answer:

use Excel Online through the 365 portal

Explanation:

just did it

In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click of a button?

A- tool bar
B- keyboard shortcuts
C- preferences
D- printing options

Answers

The answer is A. tool bar

Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in: a) agriculture and away from services b) services and away from agriculture c) industry and away from services d) agriculture, services, and industry

Answers

Answer:

^^^^^ what they said

Explanation:

its b

Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture. Thus, option C is correct.

What does the graph represents?

According to the graph, the globalization process (period 2000-2019) has affected China by decreasing the proportion of workers in agricultural activities from more than the 40% to not much above the 10%.Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture.

Meanwhile, workers in the service sector have increased from less than the 30% to more than the 60%. The percentage of people working in manufacturing activities has remained more or less stable, around the 30%.

Thus, option C is correct.

Learn more about service sector on:

https://brainly.com/question/14606383

#SPJ7

2. You go to an intemet cafe to send an email to your friend upon returning home you
realize that you forgot to log out your account. What probably could happen to your
account?​

Answers

There is a risk that someone else would gain access to your account as well as your personal information.

Pueden cojer los datos privados hackear la cuenta

Consider the following code segment.
int a = 3 + 2*3;
int b = 4 + 372;
int c = 7 % 4 + 3;
double d = a + b + c;
I
What is the value of d after the code segment is executed?

Answers

Answer:

20.0

Explanation:

3+2*6 = 9

4 + 3/2 = 5.5 but, since b is an int value, it will round down to a 5

7%4+3 = 3 +3 = 6. the % symbol will give the remainder of the quotient

9 + 5 + 6 = 20. It becomes 20.0 because d is a double value.

The value of d after the code segment is executed is 391.0

How to determine the value of d?

To do this, we evaluate the code statements one after the other.

So, we have:

int a = 3 + 2*3;

This gives a = 9

int b = 4 + 372;

This gives b = 376

int c = 7 % 4 + 3;

This gives c = 6

For double d = a + b + c;

Substitute a = 9, b = 376 and c = 6 in d = a + b + c;

So, we have:

d = 9 + 376 + 6

Evaluate the sum

d = 391.0

Hence, the value of d after the code segment is executed is 391.0

Read more about computer programs at:

https://brainly.com/question/23275071

What is the path to add a Switchboard tab to the ribbon?

Go to the File tab, Options group, then Settings.
Go to the Home tab, Format group, then Add to Ribbon.
Go to the File tab, Options group, then Customize Ribbon.
Go to the Home tab, Records group, then Customize Ribbon.

Answers

Answer:

Go to the File tab, Options group, then Customize Ribbon.

Explanation:

Got it on E2020.

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are designed by government agencies to ensure they remain free to use

The protocols of the Internet are secret to maintain the privacy and security of people using them

Each device connected to the Internet will use a protocol designed by the company that manufactured it

The protocols of the Internet are open and used by all devices connected to the network

Answers

The protocols of the Internet are open and used by all devices connected to the network

-scav

ced-vfrj-yiu
ev.eyo.ne joi.n.thro.ugh goog.le m.eet​

Answers

Answer:

n.o

Explanation:

n.o.

jdr-wivg-vmb
co.me a.nd jo.in fa.st...
go.ogle me.et​​​​​

Answers

Explanation:

what is this don't post like this

PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because

A.The introduced species compete for resources more effectively than native species


B.These introduced species will require more land to be protected


C.Introduced species often become endangered when they are placed in a new habitat


D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat

Answers

Answer: A.The introduced species compete for resources more effectively than native species.

Explanation:

An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.

When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.

Therefore, the correct option is A.

HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.

1. In Access, click Open on the File tab.

2. Select the database.

3. Click the drop-down arrow to the right of Open, and click
.

4. Click the File tab.

5. Click
, and select Encrypt with Password.

6. Enter a password when you are prompted
. Click OK.

7. Close and reopen the database.

8. To open the database again, you will need to
.

Answers

Answer:

1. Open Exclusive

2. Info

3. twice

4. enter a password

Explanation:

In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password

Which view is opened when File tab is clicked?

The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.

Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.

Learn more about password from

https://brainly.com/question/17174600

#SPJ2

Which of the following might an audio technician do to music in a recording studio? (select all that apply)

a) write it
b) mix it
c) perform it
d) master it

Answers

B Plz give brainliest

Answer

perform it

master it

mix it

Explanation:

That's the Answer

Item 3
Which of the following describes new technology development?

A harmless process

A somewhat assured process

A partially risky process

A very risky process

Answers

Answer:

A somewhat assured process

B. A somewhat assured process  is describes new technology development

What are the five phases in technology development process?

Five phases guide the new product development process for small businesses: idea generation, screening, concept development, product development and, finally, commercialization.

What is technology development process?

Technology Development Process, is a directed process at developing new knowledge, skills and artefacts that in turn facilitates platform development

To learn more about new technology development, refer

https://brainly.com/question/27090068

#SPJ2

Circuit-switched networks provide connection between two parties that: Group of answer choices is dedicated for use by the parties for the duration of a connection. prioritizing voice calls over other connections on IP networks. repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call. slicing up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient. uses a single router for each individual on either end of the connection.

Answers

Answer:

The answer is "The first choice"

Explanation:

The circuit switches are used to provide a network that connects among the two parties, which are dedicated for the use to the parties for the length of the connection. It is a familiar technique, that is used to create a network for communication, which is used on telecalls. It also enables the hardware and circuits to share among the users, and for every user, it has direct access to the circuit during the use of the network.

Write the program to convert the string “ SOFTware” into lower case ,”hardware “ string into upper case.
Combine the two strings and find the length of the combined string.

Answers

Answer:

The program in Python is as follows:

str1 = " SOFTware".lower()

str2 = "hardware ".upper()

str3 = str1+str2

lent = len(str3)

print(lent)

Explanation:

(1) Convert " SOFTware" to lower

str1 = " SOFTware".lower()

(2) Convert "hardware " to upper

str2 = "hardware ".upper()

(3) Combine both strings

str3 = str1+str2

(4) Calculate the length of the new string

lent = len(str3)

(5) Print the calculated length

print(lent)

Edhesive 8.3 lesson practice pls help

Answers

Answer:

String data type

Explanation:

See attachment for complete question

Required

Data type in stuff

On line 1 of the program, stuff is initialized as an empty list.

Line 2 to line 4; some elements are appended into stuff list

These elements are written in quotes

In programming, when an expression is written in quotes, such expressions are referred to as strings.

Hence, the elements stored in stuff are string datatypes

The data types in the elements "stuff" are string datatypes

What is strings data type?

String data type are data types in programming which is used when an expression is written in quotes(" ").

What is programming?

Programming can be defined as process of building or designing a computer program. It involves building computer instructions or algorithm and the use of the instructions to perform a particular task.

There are different types of programming language:

JavaJavaScriptPHPSQLpythonRubySwift

Learn more about programming:

https://brainly.com/question/16397886

Thumbnail sketches have vanishing points and show a natural view of an image.True or False?

Answers

Answer:

False!

Explanation:

I'm an artist- thumbnail sketches are smaller, looser versions of a bigger drawing you're going to create. They can be of anything and don't need to have a vanishing point/natural view of an object.

how do i turn off itallics on a school chromebook i accidentally turned them on in another tab and i dont know how to undo them

Answers

u go in to the bar with i b u the is italics and u press it again and it will turn it off but u have to have the text selected

When should we not use Inheritance in programming?

Answers

Answer:

You shouldn't be using inheritance if your program doesn't reuse code a lot.

Explanation:

This is really the purpose of inheritance, to make it easier for us to call repeated method calls without having to copy and paste all the time and making our program long and redundant.  If you have simple programs that don't have repeated calls, then inheritance is unnecessary.

Which of the following is the best example of a way in which a programmer can use abstraction to manage the complexity of a program?

Replacing each instance of repeated code with a call to a procedure

Replacing longer variable names with shorter variable names to reduce typing errors

Replacing several lines of documentation with a single line of documentation

Replacing lists with individual variables

Answers

Answer : C

Explanation

The best example of a way in which a programmer can use abstraction to manage the complexity of a program is to  Replacing longer variable names with shorter variable names to reduce typing errors.

Why the replacement?

The act of  Replacing longer variable names with shorter variable names to reduce typing errors is very important.

Conclusively, in any programming, to handle the complexity of a program, on can Replace the string variables such as name1, name2, name3, and name4 with the use of list of strings known as the shorter form called names.

Learn more about programmer  from

https://brainly.com/question/23275071

Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be, I just want to hear other people's comments on this. (Beatless)

Answers

Answer:

Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.

Explanation:

please mark this answer as brainliest

meaning and explanation of fortran​

Answers

Definition of FORTRAN. : a computer programming language that resembles algebra in its notation and is widely used for scientific applications. Hope this helped!

Answer:

is a general-purpose, compiled imperative programming language that is especially suited to numeric computation and scientific computing.

Explanation:

Fortran, as derived from Formula Translating System, is a general-purpose, imperative programming language. It is used for numeric and scientific computing. Fortran was originally developed by IBM in the 1950s for scientific and engineering applications.

in remote areas,your gps device may lose reception. its good idea to have a

Answers

Answer:

map or compass or follow a trail so you don't get lost

Explanation:

How do you change the order of the slides in your presentation in the slide pane? Copy and paste Delete Drag and drop Remove

Answers

Answer: you just drag the slide to the position you want it to be

Explanation:

print a test page what is the answer.​

Answers

Answer:

The keys "Ctrl" and "P"

Yah whatever he said i dont have a computer

Need answer ASAP. Plz

Answers

-Infinity       ⇒ NEGATIVE_INFINITY

Infinity        ⇒ POSITIVE_INFINITY

1.7...e+308 ⇒MAX_VALUE

5e-324       ⇒ MIN_VALUE

Other Questions
Which of the following does NOT describe a lean dough?O Has very few ingredientsionO Includes flourO Includes waterO Includes sugar What has to occur for a collaborative discussion to be successful?All students in the group agree on one idea.All members ask the exact same number of questions.All group members are able to increase their understanding.All students offer a different perspective about the same topic. How does Type 1 Diabetes affect sports performance? Can someone pls help me with this A door is fixed at the point O. Ben opened it by an angle of 30. The area swept by the door was {25}{12}\pi\ PLEASE HELPwill mark brainliest Identify 3 characteristics that plants share with algae. Nos quedamos en casetas de campaa cul es el sufijo How would I solve this? Round the greater number to the tens place. Then calculate the product.64 x 3O A. 72B. 150C. 180D. 192O E. 210 What was Monroe's concern aboutCentral and South America? (a) For real applications, the normal distribution has two potential drawbacks: (1) it can be negative, and (2) it isnt symmetric. Choose some continuous random numeric outcomes of interest to you. Are either potential drawbacks really drawbacks for your random outcomes? If so, which is the more serious drawbacks and why? (b) Many basketball players and fans believe strongly in the hot hand. That is, they believe that players tend to shoot in streaks, either makes or misses. If this is the case, why does the binomial distribution not apply, at least not exactly, to the number of makes in a given number of shots? Which assumption of the binomial model is violated, the independence of successive shots, or the constant probability of success on each shot? Or can you tell? Explain your reasoning. (c) Your company needs to make an important decision that involves large monetary consequences. You have listed all of the possible outcomes and the monetary payoffs and costs from all outcomes and all potential decisions. You want to use the EMV criterion, but you realize that this requires probabilities and you see no way to find the required probabilities. What can you do? (d) If your company makes a particular decision in the face of uncertainty, you estimate that it will either gain $10,000, gain $1000, or lose $5000, with probabilities 0.40, 0.30, and 0.30, respectively. You (correctly) calculate the EMV as $2800. However, you distrust the use of this EMV for decision-making purposes. After all, you reason that you will never receive $2800, you will receive $10,000, $1000, or lose $5000. Discuss this reasoning. (e) In the previous question, suppose you have the option of receiving a check for $2700 instead of making the risky decision described. Would you make the risky decision, where you could lose $5000, or would you take the sure $2700? What would influence your decision? (f) A potentially huge hurricane is forming in the Caribbean, and there is some chance that it might make a direct hit on Hilton Head Island, South Carolina, where you are in charge of emergency preparedness. You have made plans for evacuating everyone from the island, but duh n evacuation is obviously costly and upsetting for all involved, so the decision to evacuate shouldnt be made lightly. Discuss how you make such a decision. Is EMV a relevant concept in this situation? How would you evaluate the consequences of uncertain outcomes? (g) You often hear about the trade-off between risk and reward. Is this trade-off part of the decision making under uncertainty when the decision-maker uses the EMV criterion? For example, how does this work in investment decisions? (h) Under what conditions would you prefer a simple exponential smoothing model to the moving averages method for forecasting a time series? Explain your reasoning! Mr. Smith wants to buy some new shirts to wear at work. He hears that button down shirts are 30% off at the mall. He paid $27 to buy 1 button down shirt. What was the original price of the shirt? Derrick started a new job at McDonald's. He makes $10 per hour. Whichequation models his total weekly earnings y, in terms of the number ofhours he works x? * In a production facility, 3-cm-thick large brass plates (k 5 110 W/mK, r 5 8530 kg/m3, cp 5 380 J/kgK, and a 5 33.9 3 1026 m2/s) that are initially at a uniform temperature of 25C are heated by passing them through an oven maintained at 700C. The plates remain in the oven for a period of 10 min. Taking the convection heat transfer coefficient to be h 5 80 W/m2K, determine the surface temperature of the plates when they come out of the oven. Solve this problem using analytical one-term approximation method (not the Heisler charts). Can this problem be What is the area in square centimeters of the trapezoid below What is the importance of working as a team? I NEED EXAMPLES! GIVING BRAINLIEST! PLEASE HELP! Use the bar graph to find the relative frequency of the event.The relative frequency of spinning a 6 is ___ Which statement about the minerals plagioclase feldspar, gypsum, biotite mica, and talc can best be inferred from the chart? (1) These minerals have the same chemical and physical properties. (2) These minerals have different chemical properties, but they have similar physical properties. (3) These minerals have different physical and chemical properties, but they have identical uses. (4) The physical and chemical properties of these minerals determine how humans use them. plz help will give brainliest what is tan 330