Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.

-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.

Answers

Answer 1

Answer:

The SANS Top 20 Critical Security Controls For Effective Cyber Defense

Explanation:

Password/PIN Policy

Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.

Device Controls

Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.

Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.

Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.

As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.

Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.

Internet/Web Usage

Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.

Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.

Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.

Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.

Encryption and Physical Security

You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.

Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.

If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.

Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.

Security Policy Reporting Requirements

Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.

Empower Your Team

One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.

Answer 2

Answer:

anyone know if the other answer in right?

Explanation:


Related Questions

5. All sites are required to have the following reference materials available for use at VITA/TCE sites in paper or electronic format: Publication 17, Publication 4012, Volunteer Tax Alerts (VTA), and Quality Site Requirement Alerts (QSRA). AARP Foundation Tax Aide uses CyberTax Alerts in lieu of VTAs and QSRAs. What other publication must be available at each site and contains information about the new security requirements at sites

Answers

Answer:

Publication 5140.

Explanation:

The acronym VITA stands for Volunteer Income Tax Assistance and TCE stands for Tax Counseling for the Elderly. VITA/TCE is a certification gotten from the Internal Revenue Service in which the holders of such certification are trained on how to help people that have disabilities or that their incomes earners that are low. These volunteers help these set of people to prepare for their tax return.

In order to make the volunteers to be able to perform their work with high accuracy, the Department of Treasury, Internal Revenue Service gave out some aids for Quality Site. One of the aids which is the one contains information about the new security requirements at sites is given in the Publication 5140.

Approximately how many numeric IP addresses are possible with IPv4?

4 billon

Answers

Answer:

4,294,967,296 (~4.3B)

Explanation:

IPv4 uses 32-bits for representing addresses, thus you can have 2^32 total combinations.

Consider the following code segment. int[][] arr = {{3, 2, 1}, {4, 3, 5}}; for (int row = 0; row < arr.length; row++) { for (int col = 0; col < arr[row].length; col++) { if (col > 0) { if (arr[row][col] >= arr[row][col - 1]) { System.out.println("Condition one"); } } if (arr[row][col] % 2 == 0) { System.out.println("Condition two"); } } } As a result of executing the code segment, how many times are "Condition one" and "Condition two" printed?

Answers

Answer:

Condition one - 1 time

Condition two - 2 times

Explanation:

Given

The above code segment

Required

Determine the number of times each print statement is executed

For condition one:

The if condition required to print the statement is:  if (arr[row][col] >= arr[row][col - 1])

For the given data array, this condition is true only once, when

[tex]row = 1[/tex]  and  [tex]col = 2[/tex]

i.e.

if(arr[row][col] >= arr[row][col - 1])

=> arr[1][2] >= arr[1][2 - 1]

=> arr[1][2] >= arr[1][1]

=> 5 >= 3 ---- True

The statement is false for other elements of the array

Hence, Condition one is printed once

For condition two:

The if condition required to print the statement is:  if (arr[row][col] % 2 == 0)

The condition checks if the array element is divisible by 2.

For the given data array, this condition is true only two times, when

[tex]row = 0[/tex]  and  [tex]col = 1[/tex]

[tex]row = 1[/tex]  and  [tex]col = 0[/tex]

i.e.

if (arr[row][col] % 2 == 0)

When [tex]row = 0[/tex]  and  [tex]col = 1[/tex]

=>arr[0][1] % 2 == 0

=>2 % 2 == 0 --- True

When [tex]row = 1[/tex]  and  [tex]col = 0[/tex]

=>arr[1][0] % 2 == 0

=> 4 % 2 == 0 --- True

The statement is false for other elements of the array

Hence, Condition two is printed twice

developed the first compiler and conducted work that led to the development of COBOL ?

Answers

Answer:

Grace Hopper.

Explanation:

Grace Hopper was a US Naval Rear Admiral and an American computer scientist who was born on the 9th of December, 1906 in New York city, United States of America. She worked on the first commercial computer known as universal automatic computer (UNIVAC), after the second World War II.

In 1953 at the Remington Rand, Grace Hopper invented the first high-level programming language for UNIVAC 1 by using words and expressions.

Additionally, the high-level programming language known as FLOW-MATIC that she invented in 1953 paved the way for the development of common business-oriented language (COBOL).

Hence, Grace Hopper developed the first compiler and conducted work that led to the development of COBOL.

Write a program that will perform a few different String operations. The program must prompt for a name, and then tell the user how many letters are in the name, what the first letter of the name is, and what the last letter of the name is. It should then end with a goodbye message. A sample transcript of what your program should do is below:

Enter your name: Jeremy
Hello Jeremy!
Your name is 6 letters long.
Your name starts with a J.
Your name ends with a y.
Goodbye!

Answers

Answer:

Follows are the code to this question:

import java.util.*;//import package for user input

public class Main//defining a class Main

{

public static void main(String[] asp)//main method

{

String n;//defining String variable

Scanner oxr=new Scanner(System.in);//creating Scanner class Object

System.out.print("Enter your name: ");//print message

n=oxr.next();//input value

System.out.println("Hello "+n+"!");//print message with value

System.out.println("Your name is "+n.length()+" letters long.");//print message with value

System.out.println("Your name starts with a "+n.charAt(0)+".");//print message with value

System.out.println("Your name ends with a "+n.charAt(n.length()-1)+".");//print message with value

System.out.print("Goodbye!");//print message

}

}

Output:

Please find the attached file.

Explanation:

In the above-given code, A string variable "n" is declared, that uses the Scanner class object for input the value from the user-end.

In the next step, the multiple print method has used, which calculates the length, first and the last latter of the string value, and uses the print method to print the calculated value with the given message.

Python (and most programming languages) start counting with 0.
True
False

Answers

True....................

Answer:

yes its true  :)

Explanation:

You've created a new programming language, and now you've decided to add hashmap support to it. Actually you are quite disappointed that in common programming languages it's impossible to add a number to all hashmap keys, or all its values. So you've decided to take matters into your own hands and implement your own hashmap in your new language that has the following operations:
insert x y - insert an object with key x and value y.
get x - return the value of an object with key x.
addToKey x - add x to all keys in map.
addToValue y - add y to all values in map.
To test out your new hashmap, you have a list of queries in the form of two arrays: queryTypes contains the names of the methods to be called (eg: insert, get, etc), and queries contains the arguments for those methods (the x and y values).
Your task is to implement this hashmap, apply the given queries, and to find the sum of all the results for get operations.
Example
For queryType = ["insert", "insert", "addToValue", "addToKey", "get"] and query = [[1, 2], [2, 3], [2], [1], [3]], the output should be hashMap(queryType, query) = 5.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 2, 2: 3}
3 query: {1: 4, 2: 5}
4 query: {2: 4, 3: 5}
5 query: answer is 5
The result of the last get query for 3 is 5 in the resulting hashmap.
For queryType = ["insert", "addToValue", "get", "insert", "addToKey", "addToValue", "get"] and query = [[1, 2], [2], [1], [2, 3], [1], [-1], [3]], the output should be hashMap(queryType, query) = 6.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 4}
3 query: answer is 4
4 query: {1: 4, 2: 3}
5 query: {2: 4, 3: 3}
6 query: {2: 3, 3: 2}
7 query: answer is 2
The sum of the results for all the get queries is equal to 4 + 2 = 6.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.string queryType
Array of query types. It is guaranteed that each queryType[i] is either "addToKey", "addToValue", "get", or "insert".
Guaranteed constraints:
1 ≤ queryType.length ≤ 105.
[input] array.array.integer query
Array of queries, where each query is represented either by two numbers for insert query or by one number for other queries. It is guaranteed that during all queries all keys and values are in the range [-109, 109].
Guaranteed constraints:
query.length = queryType.length,
1 ≤ query[i].length ≤ 2.
[output] integer64
The sum of the results for all get queries.
[Python3] Syntax Tips
# Prints help message to the console
# Returns a string
def helloWorld(name):
print("This prints to the console when you Run Tests")
return "Hello, " + name

Answers

Answer:

Attached please find my solution in JAVA

Explanation:

long hashMap(String[] queryType, int[][] query) {

       long sum = 0;

       Integer currKey = 0;

       Integer currValue = 0;

       Map<Integer, Integer> values = new HashMap<>();

       for (int i = 0; i < queryType.length; i++) {

           String currQuery = queryType[i];

           switch (currQuery) {

           case "insert":

               HashMap<Integer, Integer> copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               values.put(query[i][0], query[i][1]);

               break;

           case "addToValue":

               currValue += values.isEmpty() ? 0 : query[i][0];

               break;

           case "addToKey":

               currKey += values.isEmpty() ? 0 : query[i][0];

               break;

           case "get":

               copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               sum += values.get(query[i][0]);

           }

       }

       return sum;

   }

let m be a positive integer with n bit binary representation an-1 an-2 ... a1a0 with an-1=1 what are the smallest and largest values that m could have

Answers

Answer:

Explanation:

From the given information:

[tex]a_{n-1} , a_{n-2}...a_o[/tex] in binary is:

[tex]a_{n-1}\times 2^{n-1} + a_{n-2}}\times 2^{n-2}+ ...+a_o[/tex]

So, the largest number posses all [tex]a_{n-1} , a_{n-2}...a_o[/tex]  nonzero, however, the smallest number has [tex]a_{n-2} , a_{n-3}...a_o[/tex] all zero.

The largest = 11111. . .1 in n times and the smallest = 1000. . .0 in n -1 times

i.e.

[tex](11111111...1)_2 = ( 1 \times 2^{n-1} + 1\times 2^{n-2} + ... + 1 )_{10}[/tex]

[tex]= \dfrac{1(2^n-1)}{2-1}[/tex]

[tex]\mathbf{=2^n -1}[/tex]

[tex](1000...0)_2 = (1 \times 2^{n-1} + 0 \times 2^{n-2} + 0 \times 2^{n-3} + ... + 0)_{10}[/tex]

[tex]\mathbf {= 2 ^{n-1}}[/tex]

Hence, the smallest value is [tex]\mathbf{2^{n-1}}[/tex] and the largest value is [tex]\mathbf{2^{n}-1}[/tex]

Last one, this is fashion marketing and I need to know the answer to get the 80%

Answers

Answer:

D. It requires that each item of stock is counted and recorded to determine stock levels

Explanation:

A perpetual system of inventory can be defined as a method of financial accounting, which involves the updating informations about an inventory on a continuous basis (in real-time) as the sales or purchases are being made by the customers, through the use of enterprise management software applications and a digitized point-of-sale (POS) equipment.

Under a perpetual system of inventory, updates of the journal entry for cost of goods sold or received would include debiting accounts receivable and crediting sales immediately as it is being made or happening.

Hence, an advantage of the perpetual system of inventory over the periodic system of inventory is that, it ensures the inventory account balance is always accurate provided there are no spoilage, theft etc.

The following are the characteristic of a perpetual inventory system;

I. It is the most popular choice for modern business.

II. Inventory is updated in near real-time.

III. It provides up-to-date balance information and requires fewer physical counts.

In CengageNOWv2, you may move, re-size, and rearrange panels in those assignments that use multiple panels.

Answers

Answer:

true

Explanation:

trust me lol, I promise it's correct.

A structure that organizes data in a list that is commonly 1-dimensional or 2-
dimensional
Linear Section
Constant
No answertet provided
It intro technology

Answers

Answer:

An array.

Explanation:

An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.

Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

Hence, array elements are mainly stored in contiguous memory locations on computer.

instructions and programs data are stored in the same memory in which concept

Answers

Answer:

The term Stored Program Control Concept refers to the storage of instructions in computer memory to enable it to perform a variety of tasks in sequence or intermittently.

Drag the tiles to the correct boxes to complete the pairs.
Match each type of database to its application
Multistage
Stationary
Distributed
Virtual
used for concise as well as detailed
historical data
arrowRight
used where access to data is rare
arrowRight
used for accessing data in diverse
applications using middleware
arrowRight
used by an organization that runs
several businesses
arrowRight

Answers

Answer:

1. Multistage database.

2. Stationary database.

3. Virtual database.

4. Distributed database.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

There are four (4) major types of database in a data warehouse and these are;

1. Multistage database: used for concise as well as detailed historical data. It provides summarized data which can be used by an employee for short-term decision making.

2. Stationary database: used where access to data is rare i.e business firms who do not access data frequently. In order to use this database, the users must have an access to metadata store and thus, directly having access to the data on a source system.

3. Virtual database: used for accessing data in diverse applications using middleware. This type of database is dependent on having access to information on various databases.

4. Distributed database: used by an organization that runs several businesses. Therefore, this type of database are usually located or situated in various geographical regions.

What is the difference of using Selection Tool and Direct Selection Tool?

Answers

Answer:

The Selection tool will always select the object as a whole. Use this tool when you want to manipulate the entire object. The Direct Selection tool will always select the points or segments that make up a frame

Explanation:

Write a lottery program that will ask the user if they would like to pick 5 numbers (1-30) or if they would like to choose EZ Pick where the computer randomly picks their 5 numbers at a cost of $1.00. Then you will give them a chance to also play the Next Chance drawing for an extra $1.00. They do not choose additional numbers for the Next Chance drawing. Once they have all of their selections complete, have the computer game generate the five random winning numbers and if they opted for the Next Chance drawing, select 4 more random numbers. Display all of the users numbers, all of the winning numbers, and display how much, if any, that the player has won based on the following information:

Answers

Answer:

Explanation:

The following code is written in Python and creates arrays for the user's numbers and the next chance numbers, it also creates a cost variable and a did_you_win variable. The function takes in the winning numbers as an array parameter. It asks all the necessary questions to generate data for all the variables and then compares the user's numbers to the winning numbers in order to detect if the user has won. Finally, it prints all the necessary information.

import random

def lottery(winning_numbers):

   user_numbers = []

   next_chance_drawing = []

   cost = 0

   did_you_win = "No"

   #print("Would you like to choose your own 5 numbers? Y or N")

   answer = input("Would you like to choose your own 5 numbers? Y or N: ")

   if answer.capitalize() == "Y":

       for x in range(5):

           user_numbers.append(input("Enter number " + str(x+1) + ": "))

   else:

       for x in range(5):

           user_numbers.append(random.randint(0,31))

           cost += 1

   next_chance = input("Would you like to enter a Next Chance drawing for $1.00? Y or N: ")

   if next_chance.capitalize() == "Y":

       for x in range(4):

           next_chance_drawing.append(random.randint(0, 31))

           cost += 1

           

   if user_numbers == winning_numbers or next_chance_drawing == winning_numbers:

       did_you_win = "Yes"

   print("User Numbers: " + str(user_numbers))

   print("Next Chance Numbers: " + str(next_chance_drawing))

   print("Cost: $" + str(cost))

   print("Did you win: " + did_you_win)

Implement the method countInitial which accepts as parameters an ArrayList of Strings and a letter, stored in a String. (Precondition: the String letter has only one character. You do not need to check for this.) The method should return the number of Strings in the input ArrayList that start with the given letter. Your implementation should ignore the case of the Strings in the ArrayList. Hint - the algorithm to implement this method is just a modified version of the linear search algorithm. Use the runner class to test your method but do not add a main method to your U7_L4_Activity_One.java file or your code will not be scored correctly.

Answers

Answer:

Answered below

Explanation:

//Program is implemented in Java

public int countInitials(ArrayList<string> words, char letter){

int count = 0;

int i;

for(i = 0; i < words.length; i++){

if ( words[i][0]) == letter){

count++

}

}

return count;

}

//Test class

Class Test{

public static void main (String args[]){

ArrayList<string> words = new ArrayList<string>()

words.add("boy");

words.add("bell");

words.add("cat");

char letter = 'y';

int numWords = countInitials ( words, letter);

System.out.print(numWords);

}

}

Other Questions
Which of the following has the largest atomic radius? How do historians use technology to study early humans? Choose three answers.They use the results of DNA analysis to identify early humans diseases.They use the results of radiocarbon dating to understand how long ago early humans died.They read books and summarize what other historians have reported about early humans.They revise ideas about early humans when scientific instruments provide new information.They describe the images of early cave paintings and the symbols early humans used. You have a loan for $200,000 at 8.5% annual simple interest.what is your monthly interest payment How does Ponyboy's conversation with Cherry help change his point of view about the Socs? A. Cherry's conversation with Dally makes Ponyboy ashamed of how his gang treats girls.B. Cherry's conversation with Ponyboy makes him realize he has things in common with the Socs.C. Cherry tells Ponyboy that all people struggle and face challenges.D. Ponyboy's conversation with Cherry helps him realize he doesn't want to be a high school drop out like his brotherSodapop. Why were so many distinct cultures able to develop over time in Asia? Select two correct answers.A.Mountains on the western end of the continent made it difficult for people to interactB. The emperors were afraid of giving too much power to other outside civilizations.C. Civilizations were isolated because Asian religions did not agree with western religions.D. Asian cultures worked hard to keep other civilizations from entering their landE. Deserts throughout Asia isolated communities in other areas suitable for settlement. The door opened , and an old man and a old woman came out carrying bowls of rice and soup and a leafy branch of peaches animales que empiezen por -hum What is the solution to this system of equations? please help 100 points whats the theme and whats the evidence ( easy text ) Which values from the set {2,4,6,8,10} make this inequality n + 5 > 10 true? 17. What is something an employer might look for in person when hiring? (3points)A. Someone with a positive attitudeB. Someone with positive qualities such as honesty, tolerance, andpatienceC. Someone easy to work withD. All of the above What is 4 9/29 + 6 5/58 ? Match the cultural belief to the correct religion During asexual reproduction in paramecia, a single paramecium becomes two new paramecia. The genetic material of the new paramecia is usually The following accounts are taken from the ledger of Crane Company at December 31, 2017. Notes Payable $19,600 Cash $5,900 Common Stock 24,500 Supplies 4,900 Equipment 74,500 Rent Expense 2,000 Dividends 7,800 Salaries and Wages Payable 2,900 Salaries and Wages Expense 37,200 Accounts Payable 8,800 Service Revenue 84,300 Accounts Receivable 7,800Prepare a trial balance.CRANE COMPANYTrial Balance For the Month Ended December 31, 2017For the Year Ended December 31, 2017December 31, 2017Debit Credit $ $ $ $ what did the 19 amendment do? (HURRY) Shanice won 88 pieces of gum playing the bean bag toss at the county fair. That was 4 more than twice as many as Greg. How many pieces of gum did Greg win? Which equation can be used to solve the problem? A population of 35 foxes in a wildlife preserve doubles in size every 15 years. the function y=352^x , where x is the number of 15-year periods, models the population growth. how many foxes will be after 45 years? The women's suffrage movementWho did the suffragists campaign against? Why? During the War of 1812 the White House was burned. Question 1 options: True FalseQuestion 2 (1 point) The Treaty of Paris was what ended the war. Question 2 options: True FalseQuestion 3 (1 point) Andrew Jackson won at the Battle of New Orleans after the treaty was signed. Question 3 options: True False