explain the term information security?​

Answers

Answer 1

Answer:

Information security is a set of practices designed to keep personal data secure from unauthorized access and alteration during storing or transmitting from one place to another.


Related Questions

HELP ASAP!!!!
I don't know the code to these images and I need that code now.

Answers

Answer:

Menu of turtle moves

Explanation:

What's the best way to find diamonds in Mine craft?

Answers

Answer:

go to creative mode

make a diamond block

and go to survivor mode and mine

give a like

Go to a certain y level in the ground. (I'm not sure the exact level )

Also you can go to an abandoned ship and find a map.

You can always just go into creative mode and give your self a stack and then go back into survival

Need answer ASAP. No links

Select the correct answer

Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her display dates (A.D. or B.C.) correctly on a web page?

Posted the answers on the picture since they don’t show up when I write them on here

Answers

Answer:

A <b>

Normally AD and BC are written in bold letters.

for example : The terms anno Domini (AD) and before Christ (BC).

Within available option the best option to choose is <b> hope it helped

Answer:

its d <small>

Explanation: A:D and B:C are displayed smaller then normal letters

please answer this question​

Answers

Answer:surfing, printer

Explanation:

Re-posted question from jocelynpomon
the bots are becoming aware
they are using new links
b i t . l y / 3 a 8 N t 8 n
b i t . l y / 3 t Z x a C Q
b i t . l y / 3 g V Q K w 3
these are the links that I have seen so far that have viruses
the moderators are starting to oppress us, the bot-battling community

Answers

Answer:

Ksksksksksksksksksks alv

Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this chart?

Answers

Answer: C

Explanation: Allocating roles to project team members.

Easy way of communication with people is one disadvantage of a network. *

1.True
2.False

Answers

Answer:

false

because we are able to connect with people easily..

without have to wait for long time in the case of letters..

Answer:

False.

Explanation:

A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this role. Name three other necessary skills for a system analyst

Answers

Answer: See explanation

Explanation:

Systems analysts are the people who analyse how a particular software, or IT system will be able to fit and meet the needs of their company or client. They are charged with the responsibility of writing requirements for new systems.

Some if the skills required for a system analyst include:

• Flexibility

• Strong analytical skills

• Adaptability

• Initiative

• Interpersonal skills.

• Attention to detail.

• Teamwork skills.

• Written and verbal communication skills.

What is the first step in changing where templates are stored?
Click the At startup, open all files in box.
Double-click on the Advanced option.
Open the Excel Options dialog box.
Enter the folder path to use for templates.

Answers

Answer:

Open the Excel Options dialog box

Explanation: edg

If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.

Answers

Answer:

=IF(C3=9,7,4)

Explanation:

If cell G7 contains the function =IF(C3=9,7,4), it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7; if the value in cell C3 is not 9, the number 4 will be assigned to cell G7.


What type of pointing device is often used by artists, and why is it ideal for artists?​

Answers

Answer:

A drawing/graphics tablet

Explanation:

It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.

using the URL:http://www.armyschools.edu/news/sports.html, Identify the protocol,domain name and path.​

Answers

Answer:

domain - http (usually unsafe)

protocol - news

path - info / web

Explanation:

Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }

Answers

Answer:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]

Explanation:

Given

The above code segment

Required

The final values of [tex]a,\ b\ \&\ c[/tex]

The following line declares and initializes the values of a, b and c

int a = 1;     int b = 0;     int c = -1;

So, we have:

[tex]a = 1; b =0; c = -1[/tex]

Next, the following if condition is tested

if ((b + 1) == a)

[tex]b + 1 =0 +1[/tex]

[tex]b + 1 = 1[/tex]

And:

[tex]a = 1[/tex]

So,

[tex]b + 1 = a = 1[/tex]

Since the condition is true, the statements in the curly brace { } will be executed;

[tex]b++ \to b = b+1 \to b = 0 + 1 \to b = 1[/tex]

So:

[tex]b = 1[/tex]

[tex]c += b \to c = c+b \to c = -1 + 1 \to c = 0[/tex]

So:

[tex]c = 0[/tex]

Next, the following if condition is tested

c == a

c = 0 and a =1

So:

[tex]c \ne a[/tex]

That means, the statements in its curly brace will not be executed.

So, the final values of a, b and c are:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]

WHO SAYS BUP ALL THE TIME ​

Answers

Answer:

Mario

Explanation:

convert the following decimal number into octal number-147​

Answers

Answer:

The answer for your question is 223

BIG POINTS! BIG POINTS! BIG POINTS!
Does someone know how to fix a A s u s computer that won't turn on. Computer is all the way charged. Here is some screenshots of how it looks. Can this be an easy way to fix it because I can't really take out a battery or use tools. Thanks!

Answers

Try and hold the power button for a little while, and if it doesn't turn on then you might have to contact customer support.

Answer:

take the bottom of take out the battery and putt it back in

Explanation:

what is the decimal value for the jump control?

Answers

Answer:

Is there suppose to be a pic?

Explanation:

Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact with the press and other communication professionals. Which career would allow him to use his skills, talents, and abilities the most?
A.
public relations specialist
B.
budget analyst
C.
marketing specialist
D.
freight forwarder
E.
transportation manager

Answers

A. That has the most to do with what he wants.

Answer:

A. Public Relations specialist

Explanation:

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network

Answers

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

how does a computer
open a file​

Answers

Answer:

you go to your drive and click the file and it opens it

Answer:

You press Type here to Search, if you don't know what it is, it's in the pic. Type File Explorer, and click on the File picture. Open the file

Explanation:

Type the correct answer in the box. Spell all words correctly.
Derek wants to share his digital portfolio with a wider audience. How can he do so?
Derek should publish his digital portfolio on the
, to show it to a wider audience.

Answers

Answer:

internet

Explanation:

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

What is the internet?

An international network is a collection made up of linked networks that use standardized data exchange to provide a range of digital services.

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

More about the internet link is given below.

https://brainly.com/question/13308791

#SPJ2

Pseudocode is an outline of your code that goes through the steps in human
language.
1) True
2) False

Answers

i think it’s true
hope this help

spreadsheets: what is a row

Answers

Answer:

Rows run horizontally across the worksheet and ranges from 1 to 1048576. A row is identified by the number that is on left side of the row, from where the row originates. Columns. Columns run vertically downward across the worksheet and ranges from A to XFD - 1 to 16384.

Explanation:

What is Inheritence in computer science? Explain in your won words with examples.

Answers

Answer:

Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.

Hope this makes sense!

What are the key components to planning a presentation? Check all that apply.
audience
conclusion
methods
purpose
thesis
title
topic

Answers

Answer:

I. audience

II. methods

III. purpose

IV. topic

Explanation:

Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources or samples.

Basically, any speaker who wish to create an effective presentation should endeavor to interact frequently with the audience by holding a conversation.

This ultimately implies that, to create an effective presentation, speakers are saddled with the responsibility of interacting more often with the audience by taking questions, making a joke, getting them to repeat informations loud at intervals etc.

Additionally, speakers are advised to be passionate and show enthusiasm during their presentation because it would enhance their ability to speak confidently and as such leading to an engaging presentation.

The key components to planning a presentation include the following;

I. Audience: these are the group of listeners to whom the speaker is making a presentation to.

II. Methods: the speaker should choose the most effective and efficient method to use in getting the message across to the audience (listeners).

III. Purpose: this is the main idea or reason for which the presentation is being created or done by the speaker.

IV. Topic: this is simply the title of the presentation and it describes the subject matter.

what's your opinion on Pokemon​ and pixeldip

Answers

Answer:

Its a good game but an amazing show. 10/10

Explanation:

so I like pixeldip because it also has made up Pokémon

8. A boy leaves his house at 9.30 a.m. for his
school. The school is 2 km away and classes start at
10.00 a.m. If he walks at a speed of 3 km/h for the
first kilometre, at what speed should he walk the
second kilometre to reach just in time?​

Answers

Answer:

i would say 4km

Explanation:

What is the missing line of code?

>>> __________

>>> random.randrange(10)
5
>>> random.shuffle([1,3,6])

A. import random
B. from random import shuffle
C. from random import randrange

Answers

Answer:

B. from random import shuffle

Explanation:

Answer: A.

Explanation: Import random

Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate the amount that you will have after a specific number of months. The formula is as follows:

f = p * (1 + i)^t

• f is the future value of the account after the specified time period.
• p is the present value of the account.
• i is the monthly interest rate.
• t is the number of months.

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Sample Run

Enter current bank balance:35.7↵
Enter interest rate:0↵
Enter the amount of time that passes:100↵ 35.7↵

Btw, this does not work, but is presumably close to the answer.
p=float(input("Enter current bank balance:"))
i=float(input("Enter interest rate:"))
t=float(input("Enter the amount of time that passes:"))

print(p *(1+i)^t)

Answers

Answer:

The update code is:

p=float(input("Enter current bank balance:"))

i=float(input("Enter interest rate:"))

t=float(input("Enter the amount of time that passes:"))

print(p*(1+i)**t)

Explanation:

Required

Program to compute future value

Up to the third line, your program is correct.

The only correction that needs to be made is as follows:

On the fourth line, change p*(1+i)^t to p*(1+i)**t because Python use ** as raise to power and not ^

100 POINTS. DO NOT SPAM. OR I WILL REPORT.
Write about various image degradation function.(minimum 5)​

Answers

Answer:

Explanation:

In digital image processing, degradation is a process of introducing defects to the image. Understanding the degradation function will allow restoration of the original image.

There are many different causes for image degradation such as motion blur, digital noise and lens off-focus. In cases like motion blur, it is possible to come up with an very good estimate of the actual blurring function and "undo" the blur to restore the original image. For digital noise, a statistical model can be set up to compensate for the degradation it caused.  Similarly  lens focus can be compensate by an optical model if the mis-focus is known.

The above are three degradations that I could find. A lot more information can be found about restoration functions. If you search for image degradation online, you will find a discussion on Quora and an interesting introduction from Rice University. Good luck!

Answer:

Explanation:

image degradation function helps 2 understand how a digital image has degraded n how 2 restore it

to come up w the function, start by observing the degraded image. look 4 areas w less degradation n use them as reference of the original

if equipment used 2 take the degraded image is available, try finding the exact conditions which produce the same degradation. dat will provide clues for restoration

if the degraded image can be scanned, it can be manipulated digitally w various pre-programmed functions n look 4 any improvement

one of the above should help in restoring the degraded image

Other Questions
The terra cotta army's purpose was to follow the emperor to his afterlife.* true False Answer please ASAP It has to be correct And if you arent sure dont say anything plzzz answer thooo Which statement is true?a. -0.05 < -0.06b. 7.2 < 7.02c. 7.6 > 7.575d. -4.38 > -4.37 This website gets tiring ngl what are the steps when you simplify fractions Bo gives 42 pencils to 7 students.Each student receives the samenumber of pencils. Which twoequations could be used to find thenumber of pencils each student getsA 42 = 7=6 and 5 X 7= 35B 42 = 1 = 42 and 1 X 42 = 42C 42 - 7 = 6 and 7 X 6 = 42D 7 X 7 = 49 and 42 - 6 = 7 how come i am hungry but i also dont feel like eating? PLEASE HELP!!!! I NEED THE ANSWERS URGENTLY!Find each missing length. Give all answers in simplest radical form. Question 2 of 10Which approach is best when refusing to ride with an impaired driver?A. Saying you wish you couldB. Apologizing for not goingC. Saying you don't want toD. Explaining why you shouldn'tUEM HELP!!!The coordinates of three vertices of a rectangle are (-5, 3), (-5, -2), and (2,-2). (a) What are the coordinates of the fourth vertex? . (b) What is the area of the rectangle? Which of the following is a career which would fall into the Arts & Humanities endorsement area? PLZZ ANSWER The dodo became extinct around the year 1680. How many years have passed since the dodo became extinct? Sue wakes up at 7:00 A.M. and gets ready for school. First, it takes her 20 minutes to get dressed and then 15 minutes to eatWhat time does she start eating? I don't really understand how to do this if you could help please help asap, thank you help me please. thank you! Hey can you help me fast!! I will give you a brain list if the Answer is right. Which sentence below correctly uses a comma before the quote? Select one:According to Clarke many of the water sources, have been depleted.According, to Clarke many of the water sources have been depleted. According to, Clarkemany of the water sources have been depleted.According to Clarke, many of the water sources have been depleted. Using the liquidity-preference model, when the Federal Reserve decreases the money supply, a. the equilibrium interest rate increases. b. the aggregate-demand curve shifts to the right. c. the quantity of goods and services demanded is unchanged for a given price level. d. the short-run aggregate-supply curve shifts to the left. What is settlement? Help Alfred and four other people want to be in group photograph. in how many different ways can they be arranged in a row with Alfred in the middle?