A computer professional works in a field analyzing computer systems for
businesses and determining whether they are protected from cyber threats.
Which term best describes this field?

Answers

Answer 1

A term which best describes analyzing computer systems for businesses and determining whether they are protected from cyber threats is information technology.

What is information technology?

Information technology can be defined as a field in computer science that typically deals with the use of computer systems to generate, process, store, retrieve, and exchange different types of electronic data and information over a secured network.

This ultimately implies that, information technology is a terminology which best describes analyzing computer systems used by business firms and determining whether they are protected from cyber threats.

Learn more about information technology here: brainly.com/question/14426682

#SPJ1


Related Questions

Andrew likes to know what the weather will be like. To get a weather forecast on his Android smart phone, he has a reminder _______. Andrew thinks of this as a remote control for his app. a. podcast b. network c. widget d. RSS feed

Answers

Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

What is a widget?

A widget is known to be a kind of element that is used by a graphical user interface (GUI) that shows information or gives a specific way for a user to be able to communicate with the operating system or any kind of application.

Note that Andrew has a reminder widget. Andrew thinks of this as a remote control for his app.

Learn more about widget from

https://brainly.com/question/260819

#SPJ1

You are configuring a RAID drive for a Media Streaming Server. Your primary concern is the speed of delivery of the data. This server has two hard disks installed. What type of RAID should you install, and what type of data will be stored on Disk 1 and Disk 2

Answers

Answer:

Raid 0

Explanation:

Raid 0 is a configuration used for speed priority. Datas are stored differently on each disk

For optimal speed in a Media Streaming Server, configure RAID 0 with Disk 1 and Disk 2.

What are the differences between the two?

RAID 0 offers striping, distributing data across both disks for increased throughput. Disk 1 and Disk 2 will store media files, such as videos and audio, ensuring efficient data retrieval and smooth streaming performance.

Note that RAID 0 provides no data redundancy, so backup solutions are crucial to prevent data loss in case of a disk failure.

Read more about data redundancy here:

https://brainly.com/question/30034359

#SPJ2

Difference between copy command and cut command

Answers

Answer:

Control (Ctrl) + C. Remember "C" as. The COPY command is used for just that - it copies the text or image you have selected and stores is on your virtual clipboard

Cut command = Sections of a specified file or piped data and print the result to standard output. The command cuts parts of a line by field, delimiter, byte position, and character.

Explanation:

Think of copy command as a "duplicating tool." It is taking something and duplicating it, making an exact second version of it.

The cut command is like a "delete" key. It takes something and cuts it, or deletes it.

What is the most significant difference between improving an existing process and designing a new process?

Answers

The most significant difference between improving an existing process and designing a new process is that as a person is completely working again on a process or designing a new process, there are known to be a lot of unknowns factors that may occur.

What is the difference about?

In working or  redoing a process or designing any kind of new process, there are known to be a lot of unknowns factors.

This is said to be the most significant difference that exist between improving a process and designing a new process. This makes a lot of new processes and products to be very focus on meeting their customer's performance needs or aims.

Learn more about designing from

https://brainly.com/question/1212088

#SPJ1

user calls in about a printer issue. You ask for the IPv4 address listed on the printer's configuration report. The user reads an IPv4 address of 169.254.13.50 from thereport. What would this tell you

Answers

In the case above, it tells you that the printer failed to obtain an IP address from DHCP.

What does the report means?

If a printer failed to obtain an IP address from DHCP  it implies that a given or one's network device cannot obtain the IP address from the DHCP Server and this will result in an error message.

Note that In the case above, it tells you that the printer failed to obtain an IP address from DHCP.

See options below

a. The printer has a paper jam

b. The printer failed to obtain an IP address from DHCP

c. The printer had too many print jobs sent to it

d. The printer has a valid IP address and should work after a restart

Learn more about printer report from

https://brainly.com/question/145385

#SPJ1

Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.

Answers

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

What is IPv6?

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

https://brainly.com/question/5296366

#SPJ1

A company is looking for an employee to design and test connections in its
computer systems. Which field includes this job?

Answers

The employee that design and test connections in its computer systems is in the computer architecture field.

What is design and test connections?

This is known to be a field in computer system where system engineers makes a lot of computer designs and also involve in testing of connections such as internet connections, etc.

Note that The employee that design and test connections in its computer systems is in the computer architecture field and they are known to be Computer software engineers

Learn more about  Computer jobs from

https://brainly.com/question/24588527

#SPJ1

Digital Blank______ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs. Multiple choice question. analysis transactions dashboards

Answers

Digital Dashboard track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.

What are digital dashboard?

This is known to be a kind of  an analysis tool that helps a lot of business men and women to be able to examine and analyze their most vital data sources in real time.

Note that Digital Dashboard track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.

Learn more about digital dashboard from

https://brainly.com/question/14383144

#SPJ1

What are the disadvantages of using a page description diagram?
A.
They lack flexibility.
B.
Only an experienced designer can create an effective PDD.
C.
They are difficult to understand.
D.
Web developers cannot combine them with wireframes.

Answers

A disadvantage of using a page description diagram is that: B. only an experienced designer can create an effective PDD.

What is PDD?

PDD is an acronym for page description diagram and it can be defined as a type of diagram which is used to outline the content and elements on webpages, especially by organizing their elements into low, medium, and high priority.

In Computer technology, a disadvantage of using a page description diagram is that: B. only an experienced designer can create an effective page description diagram (PDD).

Read more on web diagrams here: https://brainly.com/question/16418487

#SPJ1

You are choosing between two different window washing companies. The first charges $5 per window. The second charges a base fee of $40 plus $3 per window. Based on this information, the second company is cheaper if you have more than ______ windows.

Answers

Answer:

20

Explanation:

All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to where the data is. it makes the response to queries much faster than conventional databases. it is often used for apps like credit card fraud detection and investment risk management. it is the same as in-memory storage technology.

Answers

All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.

What is an in-database processing technology?

An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.

This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.

Read more on database here: brainly.com/question/13179611

#SPJ1

What is the error if I want to assign a value to that same index? i.e. var_str[5] = “r

Please I beg you to help!!!!

Answers

The program would only generate an error if the var_str list does not have up to 5 elements

How to determine the error?

The operation is given as:

Assign a value to that same index

This is represented as:

var_str[5] = "r"

In the above code segment, we have:

List = var_strIndex = 5Value = "r"

When a value is assigned to an index, the value at the index is updated to the new value, provided that the index exists in the list.

This means that the program would only generate an error if the var_str list does not have up to 5 elements

Read more about list at:

https://brainly.com/question/27094056

#SPJ1

Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two arguments, surrounded by brackets ([]) and separated by a comma and a space. Print an increasing sequence if the first argument is smaller than the second; otherwise, print a decreasing sequence. If the two numbers are the same, that number should be printed by itself.

Answers

Answer:

def printRange(start, stop, steps = 1):

   list1 = []

   if steps > start or stop:

       print("Steps is larger than start and stop value")

       return None

   if int(start) < int(stop):

       while start < stop:

           start = start + int(steps)

           list1.append(start)

       print(list1)

   elif start > stop:

       while start > stop:

           stop = stop + int(steps)

           list1.append(stop)

       print(list1)

   elif start == stop:

       print(start)

   else:

       print("Values are not integers.")

for easier viewing:

https://www.codepile.net/pile/e95verLk

If you need help understanding comment below.

What are 3 customizations that can be done using the header/footer section in the customize reports tray?.

Answers

The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

What is the function about?

A person can customize and also personalize the font and style of the report through the use of the header/footer section in the customize reports tray.

Therefore, The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

Learn more about header/footer  from

https://brainly.com/question/14379814

#SPJ1

Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmission of sensitive information by guests on his wireless network. What DLP technology would best meet this goal

Answers

The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

What are Network-Based DLP technology?

Network DLP is known to be a form of device that is often used to hinder vital information from being moved outside any form of corporate network and it is one that is enforced in a lot of regulated industries where compliance requirements are put in place.

Therefore, The DLP technology that would best meet Greg goal is known as Network-Based DLP technology.

Learn more about DLP technology  from

https://brainly.com/question/15177750

#SPJ1

is it possible to run a pc without a graphics card? and play games

Answers

Yes, (depends on specific game) because of a graphics chip that’s built into the CPU. Hope this helps?

What is the name of the physical database (i.e. in Microsoft Access) component(s) that is typically created from the Entity component of an ERD

Answers

The name of the physical database (i.e. in Microsoft Access) component(s) that is typically created from the Entity component of an ERD is called file

What is a database physically?

Physical database design is known to be the act of changing a data model into a physical data structure of a specific database management system (DBMS).

So, The name of the physical database (i.e. in Microsoft Access) component(s) that is typically created from the Entity component of an ERD is called file

Learn more about database from

https://brainly.com/question/518894

#SPJ1

Mike discovers that attackers have left software that allows them to have remote access to systems on a computer in his company's network. How should he describe or classify this malware

Answers

Mike can describe or classify this malware as a backdoor.

What is a backdoor in malware?

A backdoor is known to be a kind of method that is said to be used when authorized and unauthorized users are able to get get in or around any normal security measures and take  or have a high level user access on a system, network or others.

So in the above case, Mike can describe or classify this malware as a backdoor.

Therefore, option d is correct.

See options below

A. A WORM

B. CRYPTO MALWARE

C. A TROJAN

D. A BACKDOOR

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Question 2 (6.67 points)
According to many experts, how often should files be backed up?
Once a week
Once a month
Once a year
Daily

Answers

ANSWER
Once a week
ExPLNATION
Because in one month or more everything can happen and in on day you can not use your file for a day so the correct answer is Once a week

An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for "A" will be?​

Answers

Answer:

a = 0x61 = 01100001, shifted: 11000010, hex: 0xC2

l = 0x6C = 01101100, shifted: 11011000, hex: 0xD8

g = 0x67= 01100111, shifted: 11001110, hex: 0xCE

Explanation:

The ascii character codes were actually for lowercase letters, whereas the assignment uses uppercase letters.

The _______ button automatically merges the selected cells and then centers the data from the first cell across the entire merged area. Quick Analysis Merge

Answers

Answer:

Merge and Center

Which business case is better solved by artificial intelligence (ai) than conventional programmin

Answers

The business case is better solved by artificial intelligence (ai) than conventional programming are:

AI used for Industrial Operations such as  the consistent Process Optimization to make better Product Quality

AI is used in changing Advertising and Marketing such as in the Personalization works.

What is Artificial intelligence?

Artificial intelligence(AI) is a term that connote the ability of machines to be able to act or be like themselves or one that make human-like decisions so as to carry on tasks.

Hence, The business case is better solved by artificial intelligence (ai) than conventional programming are:

AI used for Industrial Operations such as  the consistent Process Optimization to make better Product Quality

AI is used in changing Advertising and Marketing such as in the Personalization works.

Learn more about programming from

https://brainly.com/question/27959437

#SPJ1

Match the action to the task it helps accomplish.
Format text at the very top or bottom of a
page
Move the text at the bottom of a page to the
top of the next page.
Increase or decrease the space around the
text on a page.

Double-click the header or footer.
Insert a page break
Adjust the margins.

Answers

The Match up to the action the task helps accomplishes are:

Format text at the very top or bottom of a page - Double-click the header or footer.Move the text at the bottom of a page to the top of the next page - Insert a page breakIncrease or decrease the space around the text on a page is Adjust the margins.

Which task is linked to formatting of text?

Formatting text in regards to Microsoft Word is known to be those tasks such as bolding a text, italicizing it, and altering the font and size.

Note that the Match up to the action the task helps accomplishes are:

Format text at the very top or bottom of a page - Double-click the header or footer.Move the text at the bottom of a page to the top of the next page - Insert a page breakIncrease or decrease the space around the text on a page is Adjust the margins.

Learn more about formatting from

https://brainly.com/question/766378

#SPJ1

What is the output of the following program?
public class Test {
public static void main(String[] args) {
new A();
new B();
}
}
class A {
int i = 7;
public A() {
setI(20);
System.out.println("i from A is " + i);
}
public void setI(int i) {
this.i = 2 * i;
}
}
class B extends A {
public B() {
System.out.println("i from B is " + i);
}
public void setI(int i) {
this.i = 3 * i;
}
}

Answers

Answer:

i from A is 7

Explanation:

Well when you invoke new B (), you got a superclass for that which is A's constructor, and it invokes first. So it displays i from A is 7

If you want to design computing components for cars and medical
equipment, which discipline should you pursue?
OA. Information systems
OB. Computer engineering
OC. Game development
OD. Information technology

Answers

Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

What Is Computer Engineering?

Computer Engineering is known to be one filed that is made up of the fields of electrical engineering and also that of computer science to form new kind of system hardware or software.

Based on the above, Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

Learn more about Computer engineering from

https://brainly.com/question/24181398

#SPJ1

Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of this cipher.

Answers

A simple substitution cipher takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

What is the Hill cipher?

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector ([tex]e_i[/tex]) and assigns it to the vectors [[tex]e_{\pi (i)}[/tex]] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: https://brainly.com/question/13155546

#SPJ1

The users, groups, and roles that have access to a server are called ______________________________.

Answers

Answer:

With the Exclusive Lock, a data item can be read as well as written. Also called write lock. An exclusive lock prevents any other locker from obtaining any sort of a lock on the object. They can be owned by only one transaction at a time

Explanation:

Write a program that asks the user to enter five test scores. The program should display a
letter grade for each score and the average test score. Write the following methods in the
program:
calcAverage:
This method should accept five test scores as arguments and return the
average of the scores.
determineGrade:
This method should accept a test score as an argument and return a
letter grade for the score, based on the following grading scale:
Score Letter Grade
90-100 A
80-89 B
70-79 C
60-69 D
Below 60 F
Expected Output:
Enter·test·grade·for·student·1:55↵ ·
Enter·test·grade·for·student·2:65↵ ·
Enter·test·grade·for·student·3:75↵ ·
Enter·test·grade·for·student·4:85↵ ·
Enter·test·grade·for·student·5:95↵ ·
The·letter·grades·are·as·follows:↵
Student·1:·F↵
Student·2:·D↵
Student·3:·C↵
Student·4:·B↵
Student·5:·A↵
The·average·grade·was:·75.00↵
ISSUES: PLEASE HELP:
I can not get the student's letter grade to display correctly;
I can not get the average to calculate correctly;
Instructions states to write the METHODS in the program.
My output:
Enter test grade for student 1:50
Enter test grade for student 2:60
Enter test grade for student 3:70
Enter test grade for student 4:80
Enter test grade for student 5:90
The letter grades are as follows:
Student 0.0F
Student F
Student F
Student F
Student F
Average:0.0
My Code:
import java.util.Scanner;
public class TestAveGrade{
public static double calcAverage(double userScore1, double userScore2, double userScore3, double userScore4, double userScore5){
double average;
average = (userScore1 +userScore2 +userScore3 +userScore4 +userScore5) /5;
return average;
}
public static String determineGrade(double testScore){
String letterGrade = " ";
if (testScore < 60){
letterGrade = "F";
} else if (testScore <70) {
letterGrade = "D";
}else if (testScore <80) {
letterGrade = "C";
}else if (testScore <90) {
letterGrade = "B";
}else if (testScore <100) {
letterGrade = "A";
}
return letterGrade;
}
public static void main( String [] args) {
Scanner scanner = new Scanner( System.in );
int numberOfScores = 5;
double userScore;
double userScore1 = 0;
double userScore2 = 0;
double userScore3 = 0;
double userScore4 = 0;
double userScore5 = 0;

Answers

To debug your code and get the student's letter grade to display correctly, you would need to add a Println command to each of them.

What is the Println used for?

This command is used to print output and when "" is used, it prints out the exact thing enclosed in the quote along with an extra code added when making mathematical calculations.

Hence, I can see that you did not add the println command/function and you can do this like this:

Println "Your test score is F" + letterGrade;Println "Your test score is E" + letterGrade;

Read more about java programming here:

https://brainly.com/question/26642771

#SPJ1

What does AU stand for in computer?

Answers

Answer:

AU stands for Audio Units.

JavaScript is an object-based programming language that involves working with the properties and methods associated with objects. True False

Answers

JavaScript is an object-based programming language that involves working with the properties and methods associated with objects is a true statement.

Is JavaScript Object-based?

Yes, JavaScript are known to be a kind of object-based language that depends on prototypes, due to the fact that it has different basis.

Hence, JavaScript is an object-based programming language that involves working with the properties and methods associated with objects is a true statement.

Learn more about JavaScript from

https://brainly.com/question/16698901

#SPJ1

Other Questions
The electron configuration of an element is 1s22s22p63s1. Describe what most likely happens when an atom of this element comes near an atom having seven valence electrons. ? QuestionJessica wants to add a border around the edge of the solar panels to help protect them from weather events.Write the standard form expression that represents the amount of border material Jessica will need.Enter the correct answer in the box.O(0) 101 d +Vo 4X11=2TTa B C 9HP OAsin cos tan sin costancsc sec cot log log inSubmit0||01a. U DO27 of. A line plot could be used as a data display for the distribution of test scores in math class. true or false What type of exercise is ideal for a client who is new to strength training and learning new movement patterns? High-intensity interval training (HIIT) Plyometrics 1RM testing Bodyweight exercises What should a client with an arthritic condition avoid doing before an exercise session? A warm-up Taking pain medications Dynamic stretching Consuming food What is a good start for learning psychology? x f(x)0 241 122 63 3 find the measure of the exterior angle x Two parallel lines are cut by a transversal. What is the measure of angle 6? Decide whether each proposed multiplication or division of measurement is possible. If it is possible, write the result in the last column of the table. Which narrative point of view is shown in the passage?The voice said: We've been watching you. You're very good at what you do. You said: Thank you. It said: We want you to do that. We want you to do what you do for them, for us. So OK. We have petitioned - we have remonstrated - we havesupplicated - we have prostrated ourselves before thethrone, and have implored its interposition to arrest thetyrannical hands of the ministry and Parliament.What is the primary emotion he appeals to here?O A. Hope B. Frustration c. Guilt D. Excitement Which of the following statements is FALSE? O The relative frequency of selecting a red card changes with the increase in number of selections. For a given number of selections, we can use Joseph's graph to find the number of diamonds that he has picked so far. O This is an example of the law of large numbers. The theoretical probability for selecting a red card in each pick is 0.5. SAVE & CONTINUE Report an issue with this question Which of the following statements is FALSE ? O The relative frequency of selecting a red card changes with the increase in number of selections . For a given number of selections , we can use Joseph's graph to find the number of diamonds that he has picked so far . O This is an example of the law of large numbers . The theoretical probability for selecting a red card in each pick is 0.5 . SAVE & CONTINUE Report an issue with this question What tone does the statement "families cannot afford privatelessons or the time it takes from the family schedule" give inParagraph 8 Of the The story Music and the Brain? Brandon suffers from bulimia nervosa and has sought the help of a therapist. His psychologist, who ascribes to the cognitive-behavioral model, gives him instructions to eat specific types and amounts of food, but to resist the urge to make himself vomit. The hope is that Brandon will come to see that eating can be a healthy and constructive behavior that requires no undoing. Brandon's psychologist is using a technique called: What is the process that all grade a milk must go through to destroy pathogenic bacteria?. Over a given period of time, if imports are greater than exports, the result is Group of answer choices A trade war. A trade surplus. An embargo. A trade deficit. write a paper Covering the following:Identify and describe labor issues that include employment opportunities, workers' rights and privileges, and growth opportunities in the industry. Identify various community programs and other services that the selected industry offers to the members of the community. Also, discuss how the community affects the industry in terms of the demand for products and services, the target customer base, and the employee base. Discuss financial responsibility within the industry. A rectangle is removed from a right triangle to create the shaded region shown below. Find the area of the shaded region. Explain why rural areas experience problems when large numbers of people move away from them.