A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer 1

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))


Related Questions

1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path with the most activities. D) longest time path through the network. E) None of the above

Answers

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method

What is one of four key principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

One of the four key principles of Responsible Artificial Intelligence (AI) is the decision-making process should be transparent and understandable. The correct option is A.

What is Artificial Intelligence (AI)?

Artificial intelligence is the process of giving a machine the capacity to reason and make decisions. The most sophisticated branch of computer science is artificial intelligence, which involves creating a mind in which a computer can think—a computer brain that can reason similarly to humans.

The creation of intelligent machines, particularly intelligent computer programs, is the science and engineering of artificial intelligence, according to John McCarthy, the founder of machine intelligence.

This results in the creation of a computer system or robotic system that attempts to function using the same logic as the human brain.

Therefore, the correct option is A. Decision-making process should be transparent and understandable.

To learn more about Artificial Intelligence (AI), refer to the link:

https://brainly.com/question/23824028

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. Decision-making process should be transparent and understandable.

B. Accountability for decisions ultimately lies with the computer algorithms

C. Companies are not reliable for violations of the law that result from the actions of AI

D. Any biases that may arise from AI processing are justifiable if they are backed by data

How to fix common problem of a computer system?​

Answers

Some ways you could fix a common problem in a computer system are

Run a thorough virus scan.
Update your software.
Cut down on the bloat.
Test your Wi-Fi connection.
Reinstall the operating system.

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

If you suspect cyber crime what do you u do?​

Answers

Answer:

Hey mate.....

Explanation:

This is ur answer.....

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Hope it helps!

Brainliest pls!

Follow me! :)

Answer:

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Explanation:

how do viruses spread from one computer to another computer?​

Answers

Answer:Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.

Answers

Answer:

A router

Sentence:

A(n) router is a network organization that centralizes user accounts, passwords, and access to resources.

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

Answers

wmic diskdrive get size

the ____, located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Answers

The ribbon located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Omitted options are  A.Title bar B.Ribbon C.Status bar D.Menu

The Microsoft Excel ribbon like other 2019 office applications is located at the the top of the window and consists of  row of tabs and icons.

This helps a user to easily locate, understand and use commands in order to complete a task.  

The ribbon in Excel is made

tabsgroupsdialog launchers command button

The excel ribbon can also be customized for individual needs.

See here: https://brainly.com/question/23647530

1- pensamiento sistémico
2- visión oriental y occidental​

Answers

I don't know

Explanation:

what do you mean?

Printers can use ________, which enable the printer to automatically print on both sides of the paper.

Answers

Answer:

Duplex

Explanation:

Changing printer setup to print duplex will enable the printer to automatically print on both sides of the paper.

Match each tool or feature to the task it completes.

Answers

Answer:

the screenshot order is correct.

Explanation:

the gray one’s are right he just got them wrong before

Which browser feature will delete your history, cache, and cookies the moment you close the special window

Answers

Answer:

Private Browsing

Explanation:

Stuff like DuckDuckGo or Brave

PLEASE HELP! WILL MARK AS BRAINLIEST
JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool

Answers

Answer:

social engineering is a way to collect data

Explanation:

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

When worksheets are grouped together you can change and create consistent _______ in all of the worksheets.

Answers

When worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets.

It should be noted that if an individual group a set of worksheets, then any changes that is made in the worksheet will have an impact on the other worksheet.

Therefore, when worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets. For example, if an individual wants to create a standard table, grouping them can help save the user a lot of time.

Read related link on:

https://brainly.com/question/25612069

principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

Explanation:

When a program unit refers to other database objects, the program unit is considered dependent on that object.

Answers

It is true that a program unit is dependent on a database object when the program unit refers to a database object

A program unit may or may not have dependency.

However, when a program unit have a dependency, the program unit will make reference to its dependency which is sometimes a database object.

Without the database object, the program would either crash or not perform as expected.

Hence, the given statement is true.

Read more about program dependency at:

https://brainly.com/question/12696037

Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends

Answers

Answer:

G00GLE Photos? I'm not sure what you mean.

Explanation:

Search engine Photos is the type of website would allow Evan, an avid traveller, to share photos and videos with his friends.

What is meant by website?

A website, often referred to as a web site, is a compilation of web pages and related content that is uploaded to at least one web server and given a common domain name. A group of World Wide Web pages that are often available online and connected to one another by a person, company, higher education institution, government, or other organization.

The primary objective of certain websites is to only present, disseminate, or display certain data or content online.

A website is a collection of connected web pages with a common domain name. The website can be made by anyone, including individuals, groups, and businesses. All websites are a part of the World Wide Web.

Thus, it is Search engine Photos.

For more details about website, click here:

https://brainly.com/question/19459381

#SPJ2

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

Answers

Answer:

In the context of data-flow diagrams (DFDs), a(n) entity symbol shows either the source or destination of the data

Explanation:

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

Explain what is Piaget and What is Cooperative problem solving.

Answers

Piaget maintained that opportunities for becoming less egocentric are more common when children discuss things with each other because then they must face the fact that not everyone has the same perspective on a situation.

hope it helps

There are many reasons why interpersonal communications may fail. While communicating, the message may not be received exactly the way the sender intended and therefore it is important that the communicator seeks to check that their message is clearly understood.
(a) Description
(b) Feedback
(c) Channel
(d) Sign ​

Answers

Answer:

a

Explanation:

description of the message to communicate

The information given illustrates feedback.

Feedback in communication simply means the response of the audience. It should be noted that feedback is important in order to know the effectiveness of one's message.

In a situation where the message may not be received exactly the way the sender intended, this implies that the feedback has been affected in this situation.

Read related link on:

https://brainly.com/question/25709466

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

What is the importance of knowing the appropriate hand tools for Computer System Sercvicing​

Answers

Answer:

The importance of having knowledge in using the appropriate tools for computer system services is knowing what tools you need in different situations, like what to use if there are screws that need to be removed or put back

Explanation:

I hope to help u dear

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this

Answers

Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.

Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.

Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.

Hence, the missing phrase is packet filtering firewall.

Learn more : https://brainly.com/question/25706522

CODEHS 3.5.4 Obi-Wan Says



You should ask the user for three pieces of information

You should confirm their name and how many droids and Wookiees they want to meet

You should confirm their name and how many droids and Wookiees they want to meet

Answers

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

# prompts user of name

num_droid = int(input('number of droids : '))

#prompts for number of droids

num_wooks = int(input('number of wookiees : '))

#prompts for number of wookiees

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

#displays the information as a complete sentence

A sample run of the program is attached

Learn more : https://brainly.com/question/25506437

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

how does the operating system coordinate the work of hardware and software?

Answers

Answer:

As the OS coordinates the activities of the processor, it uses RAM as a temporary storage area for instructions and data the processor needs. ... Programs called device drivers facilitate communication between devices attached to the computer and the OS.

Other Questions
i will send you money Why is it important that you not breathe on the baking soda test? Of all the Odes or sayings of Confucius that you have read, which do you find most valuable? Explain your answer.UGH. Im stuck again... please please please help At which point in the daily routine do clients who experience alterations in perception tend to have more problems with vivid hallucinations The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses. Secondary nucleus isa) Haploid b)Diploidc) Triploid d) Tetraploid Pls help will give brainliest. Alfred has made 8 cookies to give to his friends. Since he has 15 friends that he wants to give cookies to, how many more cookies does he need to make? Define a variable, write an equation, and solve your equation algebraically. Check your solution. from the output you made in learning task 5 explain how you use the elements and principles in your creation why do Muslims celebrate Eid-ul-adha? why should you lower the stage all the way down after using a microscope? 10. Petrolyn motor oil is a combination of natural oil and synthetic oil. It contains 3 liters of natural oil for every 4liters of synthetic oil. In order to make 518 liters of Petrolyn oil, how many liters of natural oil are needed?Step by step please Did ordinary Germans help perpetrate the holocaust? plz help will mark as brainliest If you can wash seven cars in three hours how many cars can you wash in eight hours 5 EXAMPLE OF INFORMATION QUESTION? if i can get 4 tastykake snack cakes. 4 for $5.00 how much would it be if i get 2 tastykake snack cakes? clara has a positive acceleration for 5 minutes what types of sensations do sensory receptors detect Helps ASAP please and I will give brainliest plssssss and pls answer correctly