Answer:
Written in Python
head = 0
tail = 0
for i in range(1,9):
print("Toss "+str(i)+": ")
toss = input()
if(toss == 'h'):
head = head + 1
else:
tail = tail + 1
print("Number of head: "+str(head))
print("Number of tail: "+str(tail))
print("Percent head: "+str(head * 100/8))
print("Percent tail: "+str(tail * 100/8))
Explanation:
The next two lines initialize head and tail to 0, respectively
head = 0
tail = 0
The following is an iteration for 1 to 8
for i in range(1,9):
print("Toss "+str(i)+": ")
toss = input() This line gets user input
if(toss == 'h'): This line checks if input is h
head = head + 1
else: This line checks otherwise
tail = tail + 1
The next two lines print the number of heads and tails respectively
print("Number of head: "+str(head))
print("Number of tail: "+str(tail))
The next two lines print the percentage of heads and tails respectively
print("Percent head: "+str(head * 100/8))
print("Percent tail: "+str(tail * 100/8))
Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secret and are not able to meet in person to exchange keys. What algorithm can they use to securely exchange the secret key?
a. IDEA
b. Diffie-Hellman
c. RSA
d. MD5
Greedy Algorithm Design
A couple wants to buy n major items. They will buy one item per month. They will buy all of their items at the CrazySuperStore. Due to the current economy, it is known that at some point in the future there will be a single price hike on all items at the same time, but due to the uncertainty of economic processes, it is not known when that price hike will occur. For each of the n items the couple wants to buy, both the current price, ai and the future price, bi (bi > ai), are known. (Note that the individual price hikes on items may vary. For example, one item may go from $100 to $105 while another might go from $300 to $400. They only assumption you may make about the prices is that the second price is strictly higher than the first and that you have access to all before/after prices.) Devise a greedy strategy so that the couple is guaranteed to minimize the amount of money they spend on the items. Assume that no matter what, the couple will buy all items. Clearly describe your strategy and intuitively (or formally) prove why it's optimal.
Answer:
The algorithm is as follows:
1. Start
2. Get the number of items (n)
3. Get the current price of the n items (a1, a2..... an)
4. Get the possible hiked price of the n items (b1, b2..... bn)
5. Calculate the difference between the current and hiked prices for each item i.e. \(d_i = b_i - a_i\)
6. Sort the differences in descending order (i.e. from the greatest to the least)
7. Buy items in this order of difference
8. Stop
Explanation:
The algorithm is self-explanatory; however, what it does is that:
It takes a list of the current price of items (say list a)
E.g: \(a = [100, 150, 160]\)
Then take a list of the hiked price of the items (say list b)
E.g: \(b = [110, 180, 165]\)
Next, it calculates the difference (d) between corresponding prices \(d_i = b_i - a_i\)
\(d = [(110 - 100),(180-150),(165-160)]\)
\(d = [10,30,5]\)
Sort the difference from greatest to lowest (as the difference is sorted, lists a and b are also sorted)
\(d = [30,10,5]\)
\(a = [150, 100, 160]\)
\(b = [180, 110, 165]\)
If there is no hike up to item k, the couple would have saved (i = 1 to d[k-1])
Assume k = 3
The couple would have saved for 2 item
\(Savings = d[1] + d[2]\)
\(Savings = 30 +10\)
\(Savings = 40\)
The saved amount will then be added to the kth item in list a i.e. a[k](in this case k = 3) in order to buy b[k]
Using the assumed value of k
\(a[k] = a[3]\)
\(a[3] = 160\)
\(b[3] = 165\)
Add the saved amount (40) to a[3]
\(New\ Amount = 40 + 160\)
\(New\ Amount = 200\)
This new amount can then be used to buy b[3] i.e. 165, then they save the change for subsequent items
The address of a cell is created by the intersection of
the
of the cell.
The address of a cell is created by the intersection of the respective column and row.
Additional information about "cell" is as follows:
Cells are the tens of thousands of rectangles that each worksheet is made up of. When a row and a column come together or intersect, the location is known as a cell.Columns are denoted by A, B, and C, and rows are denoted by digits. Each cell has a distinct name that comes after its column and row, also known as a cell address. Since the selected cell intersects column C and row 5, the cell address in the example below is C5.Each entry you make into a spreadsheet is stored in a cell. A cell can contain a variety of content types, including text, formatting, formulas, and functions.Cell formatting options: Cell formatting options can change how dates, numbers, and characters are displayed. A couple of percentage examples are 0.15 and 15%. We can even change a cell's text or background color.To know more about Cell Address, visit: https://brainly.com/question/28461824
#SPJ9
................. are used to summarize data (option) (a) report (b) action
i think report is right for the question
Jonathan wants to create an online journal. He will use it to share with his friends all the cool places he visits while in Europe. Which social networking tool should Jonathan use to create a journal while on his trip?
a: email
b: a blog
c: a wiki
d: a forum
Answer:
a blog
Explanation:
a forum is for questions, a wiki doesn't make sense in this situation and email wouldn't be used for this either so it should be a blog
Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lower even number. Hint: Use an if statement and the % operator to detect if n is odd, decrementing n if so. Enter an integer: 7 Sequence: 64 20 (2) If n is negative, output 0, Hint: Use an if statement to check if n is negative. If so, just set n = 0. Enter an integer: -1 Sequence: 0 Show transcribed image text (1) Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lower even number. Hint: Use an if statement and the % operator to detect if n is odd, decrementing n if so. Enter an integer: 7 Sequence: 64 20 (2) If n is negative, output 0, Hint: Use an if statement to check if n is negative. If so, just set n = 0. Enter an integer: -1 Sequence: 0
Answer:
The program in Python is as follows:
n = int(input("Enter an integer: "))
if n < 0:
n = 0
print("Sequence:",end=" ")
for i in range(n,-1,-1):
if i%2 == 0:
print(i,end = " ")
Explanation:
This gets input for n
n = int(input("Enter an integer: "))
This sets n to 0 if n is negative
if n < 0:
n = 0
This prints the string "Sequence"
print("Sequence:",end=" ")
This iterates from n to 0
for i in range(n,-1,-1):
This check if current iteration value is even
if i%2 == 0:
If yes, the number is printed
print(i,end = " ")
I'm trying to figure out how to put this together can anyone help me solve this?
The if-else statement to describe an integer is given below.
How to illustrate the informationThe if-else statement to describe an integer will be:
#include <stdio.h>
#include <stdbool.h>
int main(void) {
int userNum;
bool isPositive;
bool isEven;
scanf("%d", &userNum);
isPositive = (userNum > 0);
isEven = ((userNum % 2) == 0);
if(isPositive && isEven){
printf("Positive even number");
}
else if(isPositive && !isEven){
printf("Positive number");
}
else{
printf("Not a positive number");
}
printf("\n");
return 0;
}
Learn more about integers on:
https://brainly.com/question/17695139
#SPJ1
How would you show an external document in a running presentation?
There are a few steps that show an external document in a running presentation.
What are the steps needed?
1. On the slide, select the icon or link to the object that you want to set to run.
2. On the Insert tab, in the Links group, click Action.
3. In the Action Settings dialog box, do one of the following:
4. To click the embedded icon or link in order to open the program, click the Mouse Click tab.
5. To move the mouse pointer over the embedded icon or link in order to open the program, click the Mouse Over tab.
6. Under Action on click or Action on mouse-over, select one of the options, then select from the list at that option. For example, you can select Run Program and then browse to a program that you want to run, such as a web browser. Or if the object is a document, you can select Object action and then select Open to display the document or edit to work on it during your presentation.
To know more about External document, Check out:
https://brainly.com/question/13947276
#SPJ1
.
Algorithm:
Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.
We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.
We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.
The algorithm should be O(nlogn)
My ideas so far:
1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.
Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.
Your help would be much appreciated!
To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.
Here's the algorithm:Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.
Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.
Initialize an empty min-heap to store the machine capacities.
Iterate through the sorted jobs in descending order of priority:
Pop the smallest capacity machine from the min-heap.
If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.
Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.
Add the capacity of the inefficiently paired machine back to the min-heap.
Return the total sum of priorities for inefficiently paired jobs.
This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.
Read more about algorithm here:
https://brainly.com/question/13902805
#SPJ1
Which are benefits of using an IDE while writing a program? Select all the apply.
The IDE keeps track of and links files.
The IDE simplifies and coordinates the creation process.
The IDE allows the programmer to see errors.
Answer:
The IDE keeps track of and links files.
The IDE simplifies and coordinates the creation process.
The IDE allows the programmer to see errors.
Explanation:
The IDE stands for Integrated Development Environments. In the case when the program the following are the benefits of using an IDE
1. It tracks and link the files
2. It coordinates and simplify the proces of creation
3. Also it permits the programmer to view the errors
hence, the above represent the benefits
So all are considered to be the benefits
Answer:
Explanation:
ITs all 3. edge 2021
clicker game creating in code.org (PLEASE HELP FAST!!!)
Use code.org's visual programming tools to create a clicker game by adding buttons, score tracking, and event handlers.
To create a clicker game in code.org, you can use the visual programming tools available.
Follow these steps:
1) Start by designing the game interface.
Add buttons, labels, and any other elements you want to display.
2) Create a variable to track the score or points in your game.
Initialize it to 0.
3) Add an event handler to the button's click event.
When the button is clicked, increment the score variable by a specific amount.
4) Update the score display to reflect the updated score value.
5) Consider adding a timer or level system to make the game more challenging.
6) Add sound effects or animations to enhance the user experience.
7) Test and debug your game to ensure it functions as intended.
8) Share and enjoy your clicker game with others.
For more such questions on Visual programming:
https://brainly.com/question/29362725
#SPJ11
discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization
MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.
It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.
The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.
Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.
For more such questions on Management Information System, click on:
https://brainly.com/question/14688347
#SPJ8
is the logical topology is the arrangement of cables net work devices and end systems
The logical topology of a network is the path through which data is transferred.
What is logical topology?A logical topology is a networking concept that defines the architecture of a network's communication mechanism for all nodes. The logical topology of a network can be dynamically maintained and reconfigured using network equipment such as routers and switches.A logical topology describes how devices appear to the user to be connected. A physical topology describes how they are physically connected with wires and cables.Broadcast (also known as bus) and sequential are the two logical topologies (also known as ring). Every message sent over the network is received by all devices in a broadcast topology.The logical topology is used to create a path for signals to travel through the network. It employs network protocols to define the path for packet transfer. The most typical example of network protocol is ethernet protocol.To learn more about topology refer to :
https://brainly.com/question/14879489
#SPJ1
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.
Answers? I really need help. I'm stuck.
Answer:
one is go to is computer 3 is keyboard for is mouse 5 is Ben 10 the important of religion list out the waste and changing factor of unit called circuit
Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sales transactions to email
Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row."
The Process of Filter to batch print or emailThis process follows the steps below:
From the Delivery method dropdown menu, select Send later or Print later, then Apply.Select the checkboxes for the transactions to email or print. Select the checkbox at the top of the list to mark all.Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.
Learn more about QuickBooks use here: https://brainly.com/question/25592743
To safeguard against losses of computer equipment and important information, businesses should have _____. Select 4 options.
disaster recovery plans
natural disaster plans
emergency response readiness
business continuity plans
intrusion detection systems
Answer:
A. disaster recovery plans
D. business continuity plans
C. emergency response readiness
E. intrusion detection systems
Explanation:
lmk if im correct
To safeguard against losses of computer equipment, one should have;
Intrusion detection systems.Business continuity plans.Emergency response readiness.What safeguards should computers have?There are a lot of ways to keep your computer equipment and important information, from been stolen, They include:
The use a surge protector. The use of Anti-Virus Programs, etc.Hence, when you use the various methods above, one can be protected in case of loss or against loss.
Learn more about computer equipment from
https://brainly.com/question/23275071
¿Cuál es la capacidad pulmonar del hombre y la mujer?
Answer
El RV promedio en hombres es 1.2 L y para las mujeres es 1.1 L.
PLEASE HELP
Find five secure websites. For each site, include the following:
the name of the site
a link to the site
a screenshot of the security icon for each specific site
a description of how you knew the site was secure
Use your own words and complete sentences when explaining how you knew the site was secure.
The name of the secure websites are given as follows:
Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.
What is Website Security?The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.
It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.
Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.
Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.
Learn more about website security:
https://brainly.com/question/28269688
#SPJ1
Given integer variables seedVal and highest, generate three random numbers that are less than highest and greater than or equal to 0. Each number generated is output. Lastly, the average of the three numbers is output.
Answer:
Here's a Python code snippet to generate three random numbers between 0 and highest (exclusive), and then calculate the average of these numbers:
import random
seedVal = int(input("Enter seed value: "))
highest = int(input("Enter highest value: "))
random.seed(seedVal)
num1 = random.randint(0, highest)
num2 = random.randint(0, highest)
num3 = random.randint(0, highest)
print("First number:", num1)
print("Second number:", num2)
print("Third number:", num3)
average = (num1 + num2 + num3) / 3
print("Average:", average)
In java Please
3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:
firstName middleName lastName
and whose output is:
lastName, firstInitial.middleInitial.
Ex: If the input is:
Pat Silly Doe
the output is:
Doe, P.S.
If the input has the form:
firstName lastName
the output is:
lastName, firstInitial.
Ex: If the input is:
Julia Clark
the output is:
Clark, J.
Answer:
Explanation:
import java.util.Scanner;
public class NameFormat {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter a name: ");
String firstName = input.next();
String middleName = input.next();
String lastName = input.next();
if (middleName.equals("")) {
System.out.println(lastName + ", " + firstName.charAt(0) + ".");
} else {
System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");
}
}
}
In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.
Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.
This data was entered starting in the top left of a spreadsheet. Friends Favorite Food Favorite Book Favorite Place Favorite Sport Chris Pizza A Separate Peace Beach Football Filip Ice Cream The Things They Carried Gym Tennis Ghjuvanni Chocolate Cake Lord of the Flies City Lacrosse Yosef Lacustrine High Low Medium What item is in cell B3? A Separate Peace A Separate Peace Chips Chips The Things They Carried The Things They Carried Ice Cream
The item in cell B3 is option A:"A Separate Peace"
What is the cell about?In the given data, it is provided that the entries were made starting from the top left corner of the spreadsheet. The first column is labeled as 'Friend', second as 'Favorite Food', third as 'Favorite Book' and fourth as 'Favorite Sport'. So each entry belongs to one of these columns.
As per the data provided, "A Separate Peace" is the book that Chris, one of the friends mentioned, likes, and that information falls under the third column, 'Favorite Book' and it is the third row.
The answer is option A because, in a spreadsheet, data is usually entered starting in the top left corner, and each cell is identified by its row and column. In the given data, "A Separate Peace" is the third item in the second column, so it is located in cell B3.
Learn more about cell from
https://brainly.com/question/28435984
#SPJ1
Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which key should Jane express along the shift key
Automated implementation of an application's build, test, and deployment process is called as _____________________.
Answer:
Deployment pipeline.
Explanation:
Automated implementation of an application's build, test, and deployment process is called as deployment pipeline.
Generally, the main components of the deployment pipeline are the; build automation, test automation and deployment automation.
The main purpose why software engineers use the deployment pipeline is to enable them avoid any waste in the software development process, and to avail them the opportunity to give a rapid feedback to the production team during deployment of the software application. This ultimately implies that it involves the process of picking up a code from version control and presenting it to the end users of the software application in an automated manner.
Since, it is done automatically it helps to mitigate human errors and to meet customer's requirements.
44. A user would like to set a public network for a DMZ server.
Which of the following is a public IP subnet? (5 points)
O 172 16.1.0/24
O 192.168.10.0/25
O 64.65.128/24
O 10.0.1.0/24
Answer:
The public IP subnet out of the given options is:
c. 64.65.128/24
Explanation:
The other subnets are part of private, non-routable IP address ranges:
172.16.1.0/24 is within the 172.16.0.0 - 172.31.255.255 private range
192.168.10.0/25 is within the 192.168.0.0/16 private range
10.0.1.0/24 is within the 10.0.0.0/8 private range
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.
Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.
PLS MARK ME AS BRAINLIEST.
Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.
Ask about the difference between password protection and encryption.
Now, Password protection and encryption serve different purposes when it comes to securing data.
Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.
The password is typically a combination of characters that only authorized users should know.
Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.
The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.
Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key
Hence, Both measures are commonly used together to enhance data security.
To learn more about password protection visit:
https://brainly.com/question/32167725
#SPJ3
which of the following task manager tabs on a windows system is used to display the processes owned by each signed-in user?
The "Users" tab in Task Manager on a Windows system is used to display the processes owned by each signed-in user. (Option B)
What is the explanation for the above response?
This tab allows you to view the resource usage for each user, as well as the processes running under each user's account. It can be useful in identifying which user accounts are consuming the most resources and may need to be optimized.
Task Manager is a system monitoring tool in Windows that allows users to view and manage running processes, performance statistics, and startup programs, among other things.
Learn more about task manager at:
https://brainly.com/question/17745928
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Which of the following Task Manager tabs on a Windows system is used to display the processes owned by each signed-in user?
Processes
Users
App history
Startup
A processor operates at a clock rate of 1.6 GHz yet has a varying CPI for different instruction types. A given program has 400 ALU instructions which take the processor 7 cycles complete each instruction. It has 300 memory instructions that take 12 cycles to cycles to complete each instruction. It also has 90 branching operations that take 21 cycles to cycles to complete each instruction. How long does it take to execute this program
Answer:
0.0051825 ms
Explanation:
From the given information:
The clock time is = \(\dfrac{1}{clok \ rate}\)
\(=\dfrac{1}{6} Ghz\)
\(=\dfrac{1}{6}\times 10^9\)
To milliseconds, we have;
= 0.000000625 ms
However, the execution time is the sum total of all instruction types multiplied by the ratio of cycles taken per instruction and cycle time.
Mathematically;
Execution time is: \(\Bigg[Sum \ of \ all \Big(instruction \ type \times \dfrac{cycles taken }{instruction} \Big) \Bigg] \times cycle \ time\)
Recall that:
the cycles taken according to the ALU = 400 × 7 =2800
cycles required according to the memory instructions = 300 × 12 = 3600
cycles for branching = 90×21 = 1890
THUS;
Total cycles = 2800 + 3600 + 1890
= 8290 cycles
Finally, execution time = 8290 cycles × 0.000000625 ms
= 0.0051825 ms
Select the best ansiver for each question below
c. Linux
c. operational interference
2. What type of software works with users, application software, and computer hardware
handle the majority of technical details?
a Application
b. Desktop
d. system
The ability to switch between different applications stored in memory is called
a Diversion
b. Multitasking
d. programming
Graphic representations for a program, type of file, ar function:
a. App
e image
b. Icon
d. software
The operating system based on Linux, designed for Netbook computers, and focused on
Internet connectivity through cloud computing:
a Chrome
c. Unix
b. Mac
d. Windows
Programs that coordinate computer resources, provide an interface, and run applicatio
Answer:
the answer is going to be system
You have decided that the complexity of the corporate network facility and satellite offices warrants the hiring of a dedicated physical security and facilities protection manager. You are preparing to write the job requisition to get this critical function addressed and have solicited some ideas from the PCS working group members regarding physical and environmental security risks. Discuss the operational security functions that the physical security and facilities protection manager would be responsible for. Discuss how these functions would inform the development and implementation of system related incident response plans. Further discuss how these incident response plans fit into business continuity planning. Include at least one research reference and associated in-text citation using APA standards. In yourreplies to your peers further discuss how the concepts improve the security posture of PCS.
Answer:
All organizational security functions are as follows:
i) Classify any vital data
ii) Analyze of the hazard
iii) Analyze vulnerability
iv) Assess the risk
v) Take the appropriate risk prevention measures.
Explanation:
These methods described the incident that will fit into this business model was its ongoing support and control of its system that involves the improvements and fix bugs. For above-mentioned mechanisms aid in evaluating potential events/attacks and help reduce the risk involved with these, as well as promote network security by reducing the likelihood of any harm. In this case, appropriate monitoring and monitoring should be a must.