It has been a hectic day for the cyber security team. The team is struggling to decide to which incident to devote the most resources. You are estimating the amount of time taken to recover from each incident Which scope factor are you considering?

Answers

Answer 1

Answer:

This definitely is a project management question. The scope factors to be considered are:

Varying Resource Levels Time FactorCompliance with Regulatory Factors Requirements of Stakeholders Quality of Management RisksLegal Factors

Explanation:

Any element or factor that can advantageously advance a project or negatively impact it is usually referred to as Project Scope Factor.

It is considered a desirable or nice-to-have ability to be able to spot these factors to the end that the positive ones are enhanced whilst negative ones are mitigated.

Failure, for instance, to timeously and properly identify factors that can negatively impact a project is most likely to result in a negative outcome.

Cheers


Related Questions

Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);

Answers

Answer:

The valid operations are:

*q = *(&a[0]);  and q = &(*p);

Explanation:

Given

The above declarations

Required

The valid operations

*q = *(&a[0]);  and q = &(*p); are valid assignment operations.

However, q = &&a[0]; q = &&a; are invalid because:

The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.

Hence, *q = *(&a[0]);  and q = &(*p); are valid

Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler

High-level modulation is used: when the intelligence signal is added to the carrier at the last possible point before the transmitting antenna. in high-power applications such as standard radio broadcasting. when the transmitter must be made as power efficient as possible. all of the above.

Answers

Answer:

Option d (all of the above) is the correct answer.

Explanation:

Such High-level modulation has been provided whenever the manipulation or modification of intensity would be performed to something like a radio-frequency amplifier.Throughout the very last phase of transmitting, this then generates an AM waveform having relatively high speeds or velocity.

Thus the above is the correct answer.

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam.
What should he do?
O Configure a safe recipient.
O Configure a blocked sender.
O Configure a safe sender
O Do nothing.

Answers

Answer:

Configure a safe sender

Explanation:

The Safe Sender List in Outlook, is a list of domain names and email addresses that are not managed in the manner spam and junk messages are filtered out and placed in the spam or junk folder. The emails of contacts added to the Safe Senders list are always received in the inbox

Therefore, to ensure that messages from his colleague are never treated as spam, Walt should;

Configure a safe sender.

space bar in computer​

Answers

Answer: Its the one in the middle the really long thingy it looks like a rectangle

Explanation:

ITS IN THE MIDDLE

why absolute reference is used in spreadsheet

Answers

Answer:

Absolute reference is used especially to keep the value or content of a column or row constant.

Explanation:

Cell referencing is one common and important concept in spreadsheets. A cell reference or cell address is a value, mostly alphanumeric, used to identify a specific cell or cell range in a worksheet.

In spreadsheets such as that of Microsoft - excel - there are basically two types of referencing.

i. relative referencing

ii. absolute referencing

iii. mixed referencing

Relative reference is the default cell reference. When a relative reference is copied and pasted across multiple cells, it changes depending on its relative position. This type of reference is especially useful when there is a need to apply same formula across multiple rows or columns.

Absolute reference, on the other hand, will not change even though it is copied across multiple cells. It is used especially to keep the value or content of a column or row constant.

Mixed reference is a hybrid of the relative and absolute references.

Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(greater_than_2) Let's return to our DataFrame of missing puppies, which is loaded as mpr. Let's select a few different rows to learn more about the other missing dogs. 5 # Select the dogs whose Status is equal to Still Missing 6 still_missing = mpr[mpr. Status == 'Still Missing'] 7 print (still_missing) Instructions 100 XP • Select the dogs where Age is greater than 2. 9 # Select all dogs whose Dog Breed is not equal to Poodle 10 not-poodle = mpr [mpr.Dog Breed != 'Poodle'] 11 print(not_poodle) • Select the dogs whose Status is equal to Still Missing. • Select all dogs whose Dog Breed is not equal to Poodle. Run Code Submit Answer * Take Hint (-30 XP) IPython Shell Slides Incorrect Submission Did you correctly define the variable not_poodle ? Expected something different. # Select all dogs whose Dog Breed is not equal to Poodle not_poodle = mpr[mpr.Dog Breed != 'Poodle'] print(not_poodle) File "", line 10 not_poodle = mpr [mpr.Dog Breed != 'Poodle'] Did you find this feedback helpful? ✓ Yes x No SyntaxError: invalid syntax

Answers

Answer:

# the dog dataframe has been loaded as mpr

# select the dogs where Age is greater than 2

greater_than_2 = mpr [mpr. age > 2]

print(greater_than_2)

# select the dogs whose status is equal to 'still missing'

still_missing = mpr[mpr. status == 'Still Missing']

print(still_missing)

# select all dogs whose dog breed is not equal to Poodle

not_poodle = mpr [mpr.breed != 'Poodle']

print(not_poodle)

Explanation:

The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.

The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.

calculateAverageSalary(filename): Returns the average salary of all employees rounded down to 2 decimal points highestHireMonth(filename): Returns the month (integer) during which most hires were made over the years getMonth(date): Helper function to extract and return the month number from a date given as a string input of format MM/DD/YY. Return type should be an int.

Answers

Answer:

An extract from the answer is as follows:

for i in salary:

 total_salary+=float(i)

 count+=1  

return round(total_salary/count,2)

def getMonth(date):

ddate = []

for i in date:

 ddate.append(i.split('/')[0])

mode = int(max(set(ddate), key=ddate.count))

return mode  

def highestHireMonth(filename):

month = []

See explanation for further details

Explanation:

Given

Attachment 1 completes the question

The complete answer could not be submitted. So, I've added it as an attachment.

See attachment 2 for program source file which includes the main method.

Comments are used to explain difficult lines

C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in an expression.#include using namespace std;double FindMax(double num1, double num2) { double maxVal; // Note: if-else statements need not be understood to complete this activity if (num1 > num2) { // if num1 is greater than num2, maxVal = num1; // then num1 is the maxVal. } else { // Otherwise, maxVal = num2; // num2 is the maxVal. } return maxVal;}int main() { double numA; double numB; double numY; double numZ; double maxSum; cin >> numA; cin >> numB; cin >> numY; cin >> numZ; /* Your solution goes here */ cout << "maxSum is: " << maxSum << endl; return 0;}

Answers

Answer:

Replace the comment with:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

Explanation:

Required

The statement to add up the two maximum from the functions

To do this, we have to call FindMax for both arguments i.e.

FindMax(numA,numB) and FindMax(numY,numZ) respectively

Next, use the + sign to add up the returned value.

So, the complete statement is:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

See attachment for complete program

loa (speaker) thuộc nhóm thiết bị nào ?

Answers

Answer:

this say's "Which device group?" hope i helpped

What are TWO examples of soft skills?
computer programming
o responsibility
certification
communication
troubleshooting

Answers

Computer programming and throubleshooting

For which of the following values of A and B will the expression A || B be true?

A = False, B = False

Both A and B must be true

The expression is impossible to be true no matter the values of A and B.

A = False, B = True

Answers

Answer:

A = False, B = True

Explanation:

|| is equal OR. To the expression be true, you need one of them to be true or both.

A = TRUE, B = FALSE

Returns true

A = FALSE, B = FALSE

Returns true

A = TRUE, B = TRUE

Returns true

Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime​

Answers

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

Any action that causes harm to your computer is called a security risk. That is option 3.

What is security risk in computer?

A computer is an electronic device that can be used to prepare, process and store data.

Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.

Some of the security risks that predisposes a computer to damage include the following:

unpatched software,

misconfigured software or hardware, and

bad habits such as keeping fluid close to the computer.

Therefore, any action that causes harm to your computer is called a security risk.

Learn more about security risks here:

https://brainly.com/question/25720881

Smartphones are more likely to be used than laptop computers for everyday ICT use.
Describe three advantages of using a smartphone rather than a laptop computer.

Answers

Answer:

it's small amd you can carry it everywhere

easy to use

long lasting battery

Explanation:

hope the answers are right:)

A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are taken in the steady state for this system with the following results:

Average packet waiting time in the buffer = 0.05 seconds
Average number of packets in residence = 1 packet
Average packet length = 1000 bits

The distributions of the arrival and service processes are unknown and cannot be assumed to be exponential.

Required:
What are the average arrival rate λ in units of packets/second and the average number of packets w waiting to be serviced in the buffer?

Answers

Answer:

a) 15.24 kbps

b) 762 bits

Explanation:

Using little law

a) Determine the average arrival rate (  λ  ) in units of packets/s

λ  = r / Tr  --- 1

where ; r = 1000 bits , Tr = Tw + Ts = 0.05 + (( 1000 / (64 * 1000 ))  = 0.0656

back to equation 1

λ = 1000 / 0.0656 = 15243.9 = 15.24 kbps

b) Determine average number of packets w to be served

w =  λ * Tw =  15243.9 * 0.05 = 762.195 ≈ 762 bits

Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
least important to her in designing the company's network?
the tasks performed by each computer on the network
the number of hours each employee works
O the number of computers that will be on the network
the way in which business documents are shared in the organization
TURN IT IN
NEXT QUESTION
ASK FOR HELP

Answers

The way the documents are shared

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
O No messages will ever be blocked from the user's mailbox.
O Messages can still be blocked at the server level
O Messages cannot be blocked at the network firewall
O Most obvious spam messages will still reach the client computer
ANSWER IM TIMED

Answers

Answer: Most obvious spam messages will still reach the client computer

Explanation:

It should be noted that by default, usually the junk email filter is already set to No Automatic Filtering.

When a user configures No Automatic Filtering in Junk Mail Options, it should be noted that most obvious spam messages will still reach the client computer.

Therefore, the correct option is D.

Assume a varible is declared in a block of code within a pair of curly braces. The scope of the variable ______ Group of answer choices starts from its declaration point and extends to the end of the block. starts from its declaration point and extends to the end of the entire program. covers the entire block, including the code before the declaration point. covers the entire program, including the code in the other blocks.

Answers

Answer:

The answer is the second choice that is "starts from its declaration point and extends to the end of the entire program".

Explanation:

In a functional component were specified variables of local scope, and those outside are defined of global scope. It shows that the local variables can be accessible within the specified function, whereas global variables can be accessed via all functions all through the code structure. The variable size is the code portion where the variable can be accessed.

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers

Answers

Answer:

Centralized Processing

Explanation:

Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.

Design a class named largeIntegers such that an object of this class can store an integer of any number of digits. Add operations to add, subtract, multiply, and compare integers stored in two objects. Also add constructors to properly initialize objects and functions to set, retrieve, and print the values of objects. Write a program to test your class. g

Answers

Answer:

Here the code is given as follows,

Explanation:

Code:

import java.util.Scanner;

//created class named largeintegers

class largeintegers{

   //class can hold a long number

   long number;

   //constructor to set number

  largeintegers(long number){

      this.number=number;

  }

  //getNumber method to get number

  long getNumber(){

      return number;

  }

  //below are some basic operations

  long addition(long num1,long num2){

       return num1+num2;

   }

   long subtract(long num1,long num2){

       return num1-num2;

   }

   long multiply(long num1,long num2){

       return num1*num2;

   }

   boolean compare(long num1,long num2)

   {

       return num1>num2;

   }

  public static void main(String[] args) {

      //declared to long numbers

      long number1,number2;

      //scanner class to take user input

      Scanner sc= new Scanner(System.in);

      //taking input numbers

      System.out.println("Enter a Number ");

      number1=sc.nextLong();

      System.out.println("Enter 2nd Number :");

      number2=sc.nextLong();

      //created two objects

      largeintegers object=new largeintegers(number1);

      largeintegers object2=new largeintegers(number2);

      //displaying two numbers

      System.out.println("Entered Numbers ");

      System.out.println(object.getNumber());

      System.out.println(object2.getNumber());

      //calling basic methods using created objects

      System.out.println("Some Operations on Given two Numbers ");

      System.out.println("Addition:"+object.addition(object.getNumber(), object2.getNumber()));

      System.out.println("Subtraction:"+object.subtract(object.getNumber(), object2.getNumber()));

      System.out.println("Multiplication:"+object.multiply(object.getNumber(), object2.getNumber()));

      System.out.println("Comparison:");

      if(object.compare(object.getNumber(), object2.getNumber())==true)

      {

          System.out.println("First Number is Greater than Second Number ");

      }

      else

      {

          System.out.println("Second Number is Greater than First Number ");

      }

      sc.close();

  }

}

Output:-

write short notes about monitor printer and speaker​

Answers

Answer:

A computer monitor is an electronic device that shows pictures for computers. Monitors often look similar to televisions. The main difference between a monitor and a television is that a monitor does not have a television tuner to change channels. Monitors often have higher display resolution than televisions.

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.

Speakers receive audio input from the computer's sound card and produce audio output in the form of sound waves. Most computer speakers are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or amplitude, of the sound.

Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .

Answers

Answer:

The method in Python is as follows:

def checkStr(strng):

   if strng[0].isupper() and strng[-1] == "?":

       return True

   else:

       return False

Explanation:

This defines the method

def checkStr(strng):

This checks if the first character i upper and if the last is "??

   if strng[0].isupper() and strng[-1] == "?":

If the condition is true, the function returns true

       return True

Else, it returns false

   else:

       return False

how can you explain that algorithm and flowchart are problem solving tools?​

Answers

Answer:

Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.

go sub to VolleyBall_chan on y.o.u.t.u.b.e

Answers

okkkkkkkkkkkkkkkkkkk God bless you!

Answer go to y o u t u b e type in volleyball_chan hit the sub button

Explanation:

The small flash memory used in
protable device like Laptop

Answers

Answer: flash drive

Explanation:

Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.

Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.

1. Design pseudocode for a program that will permit a user to store exactly 75 numbers in an array. Create an array big enough to hold the numbers and store each number in the array as it's entered. Be sure to PROMPT the user for each number before it's entered. You do not need to initialize the array. HINTS: Make sure you use a named constant when you declare the array (the number inside the brackets should be a named constant that you declared before the array declaration.) Use a for loop (or while loop if you'd like) to get each number from the user. The module has an example of pseudocode very similar to this problem. You're free to use this pseudocode as you create your program. 2. Identify three advantages of arrays. For each advantage, write at least one complete sentence explaining why the advantage you listed is an advantage. More detail is better. You may use outside resources but be sure to CITE those resources using APA format.

Answers

Answer:

Question 1: The pseudocode is as follows:

int n = 70;

   int intArray[n];

   for(int i = 0; i< n; i++){

       print("Input "+(i+1)+": ")

       input intArray[i];

   }

Question 2: Advantages of array

Indexing in arrays in easyIt can be used to store multiple values of the same typeIt can be used for 2 dimensional inputs

Explanation:

Question 1

This declares and initializes the length of the array

int n = 70;

This declares the array

   int intArray[n];

This iterates through the length of the array

   for(int i = 0; i< n; i++){

This prompts the user for inputs

       print("Input "+(i+1)+": ")

This gets input for each element of the array

       input intArray[i];

   }

Question 2

Indexing: Elements of the array can easily be accessed through the index of the element.

For instance, an element at index 2 of array intArray can be accessed using: intArray[2]

Multiple Values: This is illustrated in question 1 above where we used 1 array to collect input for 70 values.

2 dimensional inputs: Literally, this means that array can be used to represent matrices (that has rows and columns).

An illustration is:

intArray[2][2] = {[0,1],[3,5]}

The above array has 2 rows, 2 columns and 4 elements in total.

Create a method called letterGrade that will pass the student's average grade as a parameter and return a letter grade (char). Once passed, use an if..else if structure to determine whether the student has an A, B, C, D, or F. Return that letter grade. Use the standard grade scale: 90-100 (A), 80-89 (B), 70-79 (C), 60-69 (D), 0-59 (F).

Answers

Answer:

The method in Java is as follows:

public static char letterGrade(int average){

    char grade =' ';

    if(average>= 90 && average <=100){ grade ='A'; }

    else if(average>= 80 && average <=89){ grade ='B'; }

    else if(average>= 70 && average <=79){ grade ='C'; }

    else if(average>= 60 && average <=69){ grade ='D'; }

    else if(average>= 0 && average <=59){ grade ='F'; }

    return grade;

}

Explanation:

This defines the method

public static char letterGrade(int average){

This initializes the grade to a blank

    char grade =' ';

If average is between 90 and 100 (inclusive), grade is A

    if(average>= 90 && average <=100){ grade ='A'; }

If average is between 80 and 89 (inclusive), grade is B

    else if(average>= 80 && average <=89){ grade ='B'; }

If average is between 70 and 79 (inclusive), grade is C

    else if(average>= 70 && average <=79){ grade ='C'; }

If average is between 60 and 69 (inclusive), grade is D

    else if(average>= 60 && average <=69){ grade ='D'; }

If average is between 0 and 59 (inclusive), grade is F

    else if(average>= 0 && average <=59){ grade ='F'; }

This returns the grade

    return grade;

}

Horizontal Navigation List Styles
Go to the Horizontal Navigation List Styles section. Karen has added a second navigation list that she wants to display horizontally. For all list items within the horizontal navigation list, create a style rule that displays the items as blocks with a width of 12.5% floated on the left margin.
Here is my code:
/* Horizontal Navigation List Styles */
.horizontal li {
display: block;
width: 12.5%;
float: left;
}
It's coming through as just a line and I have no idea how to fix it, please help!

Answers

Answer:

Explanation:

The best way to do this would be to use the following line of code

clear: left;

This would make sure that there are no floating elements (li's in this scenario) on the left side of each element. Which in this navigation list would be each individual element, causing it to move each element underneath the previous element. Therefore the entire CSS code would be

.horizontal li {

   display: block;

   width: 12.5%;

   float: left;

   clear: left;

   }

An example can be seen in the attached picture below.

explain about primary memory?​

Answers

Answer:

Primary memory is computer memory that a processor or computer accesses first or directly. It allows a processor to access running execution applications and services that are temporarily stored in a specific memory location. Primary memory is also known as primary storage or main memory.

Explanation:

Depending on your web browser, you may be able to locate a folder or a file on your machine that contains cookies. Look through the folder or open the file. List references to three websites you have visited.

Answers

Answer:

yourmom.com    yourhaouse.com   and     mcdonalds.org

Explanation:

A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device​

Answers

Answer:

D, routers enable us to connect to the internet.

Other Questions
pls help due 30 mins Christian Robbie are construction arytenoids stained glass window whose length is 7.3 inches longer than its width if the area of the window is 596.9 in. find the width and the length which statement is true? Mr.Jones is a helpful teacher.Which part of speech is Mr.Jones in this sentence does oppression, inequalities, exploitation and domination mean the same thing? A bag contains 2 red marbles, 4 blue marbles and 8 green marbles. If two marbles are drawn out of the bag, what is the probability, to the nearest 10th of a percent, that both marbles drawn will be blue? La historia del Per :o Is photosynthesis the ONLY driver for cycling matter and energy in ecosystems? yes or noDo not play on my question please. Which of the following best explains why Angola and Cuba experienced different economic conditions than Algeria and Belize in the late 20th century?O Angola and Cuba relied on the export of oil, and their economies contracted when oil prices dropped.O Angola and Cubas dependence on the Soviet Union caused their economies to struggle after the Soviet Union collapsed.O Algeria and Belize were largely self-sufficient and avoided the worst effects of the global financial meltdown.O Algeria and Belize benefited from the creation of the World Trade Organization, while Angola and Cuba did not. HELP MEEEEEEEEEEEE Explain the difference in How the tree and the fox get carbohydrates to use for energy Select all that apply.A spinner is divided into 4 equal sections. Which of the following are true?The experimental probability is for each section.If the spinner is spun 64 times, you would predict it to land on each section 16 times.The spinner will land on each section of the spinner an equal number of times.The theoretical probability is 25% for each section.Multiple choice!!! (Right angle) Trigonometry Help me find the X value please! Explain what you did to get the answer aswell When first accused of committing a crime, a guilty person will most likely deny the accusation immediately repeat the accusation in the form of a question say nothing try to blame someone else ) A desk organizer sells for $35, which includes a markup rate of 60% based on the selling price.a. Find the markup.b. Find the cost. find the hight of the tree to the nearest hundredth of a meter What are the consequences of disputes over water?Someone tell me pls!!!!! help me pls on these Which accurately describes a chart developed 20 years after a historical event?A. effective secondary source documentB. too biased for historical evidenceC. too focused for historical evidenceD. unreliable narrative sourceE. useful primary source document What is this expression in simplest form? (x+2)/(4x^2+5x+1) * (4x+1)/(x^2-4)