In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimated 40 million customers at risk. In 2009, the health care provider BlueCross BlueShield of Tennessee suffered a theft of hard drives when it reported 57 hard drives stolen. Both these cases resulted from a(n) ________________ failure

Answers

Answer 1

Answer:

Security Policies

Explanation:

As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.


Related Questions

Which of the following uses the operators “and”, “or”, and “not” to get more exact search results?
A. Boolean logic
B. Google logic
C. Search logic
D. Research logic

Answers

Answer:

Boolean logic

Explanation:

Boolean Operators: “Or,” “And,” and “Not”.

Answer:

A. Boolean logic

Explanation:

    The name of the mathematician George Boole is the origin of Boolean logic, which is based on set theory.

    The Boolean operators AND, OR, NOT are used to combine several terms in the same search. Its use is very useful whenever it is necessary to refine a search in a database.

What are examples of network hardware? (Choose more than one)

Question 4 options:

Hubs


switches


routers


Layers


Sieve

Answers

Hubs is the common connection point in networks.  Remember where we plug our ETHERNET cable of internet, yes in a small device, that is hub.Switches is a device used to connect or break connection in electric circuits.Routers used with switches are used to connect different connections.

The Examples of network hardware are:

HubsSwitchesRouters

Explanation:

A hub is a device that is used to make multiple connections. When multiple connections are to be made which includes wires coming from different branches, a hub is used.

A switch is a hardware device that is responsible for filtering and forwarding network packets. There are three types of switching techniques:

circuit switching, packet switching, and message switching.

A router is another hardware networking device. The function of a router is to forward data packets between multiple networks.

Technician A says that oil for the rod bearings comes from splash off the crankshaft. Technician B says that lubrication to the main bearings is fed through the main oil gallery in the block. Who is correct?

Answers

Answer: technician B

Explanation:

The oil is picked up from the oil pump though a pick up tube that is mounted on the oil pump. The end of the pick up tube sits in the oil at the bottom of the oil pan. The oil is then forced through holes that are drilled into the block. Those holes which are called (journals) lead to the main bearings,rod bearings,lifters, camshaft, ect..

Technician B says that lubrication to the main bearings is fed through the main oil gallery in the block is correct.

How are the main bearings lubricated?

Lubrication regimes

Engine bearings are lubricated by motor oils constantly supplied in sufficient amounts to the bearings surfaces. Lubricated friction is characterized by the presence of a thin film of the pressurized lubricant (squeeze film) between the surfaces of the bearing and the journal.

Which lubricant is used for bearing?

A lithium-based grease, whose base oil is mineral oil, is commonly used as a lubricant for rolling bearings, as it is compatible with the working surface of the bearing. Its operating temperature range is -30˚C to 130˚C.

To learn more about Lubrication, refer

https://brainly.com/question/23404955

#SPJ2

For a string s ∈ {0, 1} let denote the number represented by in the binary * s2 s numeral system. For example 1110 in binary has a value of 14 . Consider the language: L = {u#w | u,w ∈ {0, 1} , u } , * 2 + 1 = w2 meaning it contains all strings u#w such that u + 1 = w holds true in the binary system. For example, 1010#1011 ∈ L and 0011#100 ∈ L . Construct a TM that decides this language.

Answers

4657879790989o689ok,vm vm  vjl478o78o7t8o78o8y;l. ,nmhnjser467iu56uy56uh by

Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physically participates? A. Wireless fidelity*B. Virtual realityC. Augmented realityD. Agile methodology

Answers

Answer:

B. Virtual reality

Explanation:

In a virtual reality context, the visual and auditory senses of the user are fed by data (images, sounds) from the computer using a goggle and earphones.  That allows the person to be totally cut off her real physical environment and be totally immersed into the world (reality) managed by the computer.

Not to be confused with augmented reality, where the physical reality and perception of it aren't changed... but an additional layer of information is added on top of it.  Like pointing your phone camera to a building and getting information about the building displayed on your phone.

Choose the correct format for giving credit to an author when including a quotation in a literary analysis essay. A. (Page#, Author First Name) B. (Page#, Author Last Name) C. (Author Last Name Page#) D. (Author Full Name, Page#)

Answers

Answer:

Option C: (Author Last Name, Page#)

Explanation:

The term used for giving credit to an author when including a quotation in a literary essay is known as In-text citation.

In-text citation is used whenever someone does not quotes directly rather uses someone else's ideas or quotes to support his own thoughts or sayings.

For this purpose, the last name of author and page number are written inside parenthesis after the reference quote.

Answer:

c

Explanation:

. Write a function wordscramble that will receive a word in a string as an input argument. It will then randomly scramble the letters and return the result. Here is an example of calling the function: >> wordscramble('fantastic') ans = safntcait

Answers

Answer: You can use the function randperm() to generate a random permutation of the indexes. so then you would use the random permutation to reorder the string array

Explanation:

Write a Java program that reads an 8-bit binary number from the keyboard as a string and then converts it into decimal. For example, if the input is “01001101”, the output should be “77”. (Hint: Break the string into substrings and then convert each substring to a value for a single bit (i.e., 0 or 1). If the bits from right to left are b0, b1, …, b7; the decimal equivalent value is b0 + 2b1 + 4b2 + 8b3 + 16b4 + 32b5 +64b6 + 128b7.

Answers

Answer:

public class Brainly

{

 public static void main(String[] args)

 {

   BinaryConverter conv = new BinaryConverter();

   String binStr = "01001101";

   System.out.print(binStr + " in decimal is "+conv.BinToDec(binStr));

 }

}

public class BinaryConverter

{

 public int BinToDec(String binStr)

 {

   int d = 0;

   while(binStr.length() > 0)

   {

     d = (d << 1) + ((binStr.charAt(0) == '1') ? 1: 0);

     binStr = binStr.substring(1);

   }

   return d;

 }

}

Explanation:

The program "eats" the string from left to right, and builds up the integer representation in variable "d" on the go. While there are digits left, it shifts the previous result to the left and sets the least signficant bit to 1 only if the corresponding string character is a 1.

1. Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment to Host C with destination port number 6789. Will both of these segments be directed to the same socket at Host C? If so, how will the process at Host C know that these two segments originated from two different hosts?

Answers

Yes. Host A and B have the same destination port numbers and thus, their UDP segments will arrive to the socket at host C. In this case, the UDP sockets are represented by the protocol IP and Port. Host C will be able to differentiate between them by doing a check on the source IP and source port from the UDP header.

Final answer:

Both UDP segments sent by Host A and Host B to Host C's port number 6789 will be directed to the same socket. Host C differentiates them based on their source IP addresses and source port numbers.

Explanation:

If a process in Host C has a UDP socket with port number 6789, and both Host A and Host B send a UDP segment to Host C with destination port number 6789, both of these segments will indeed be directed to the same socket at Host C. This is because the port number serves as an identifier for incoming data traffic, ensuring that data is sent to the correct receiving application process.

Although both segments are directed to the same socket, the process at Host C can distinguish between the two segments because each UDP segment contains not only the destination port number but also the source IP address and the source port number from which it originated. These details provide enough information for the receiving process to differentiate between segments from Host A and Host B. In the analogy of an apartment building, where the port number would be the apartment number, the source IP address and source port number are analogous to the return address on a piece of mail. The combination of these uniquely identifies each sender.

You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on some commands to perform your job. Open the manual pages and find all the commands that have the word "copy" in their name or description. What command did you use to accomplish this task? Are there any commands in this list that only a root user can execute? How are they indicated? Select any two of them and compare their info and manual pages. Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos).

Answers

Step 1 of 4

What command did you use to accomplish this task?

First of all, let us ask ourselves what manual pages or man pages are. Manual pages in Unix/Linux are sometimes referred to as an online form of software documentation. They are a set of pages that try to explain and expound every command available on your system. Further, these pages explain to you the specifics of what each command does and how to run them. And in this case, we can use two commands to search for all the commands that have the word "copy" in their name or description. The commands are “man –k copy” or “apropos copy”

Step 2 of 4

Are there any commands in this list that only a root user can execute? How are they indicated?

Yes. There are several commands in this list that only a root user can execute. If you would want to find out what these commands are, the best way to do that is to look at those manual pages that are indicated by the manual page section number. If it has a number 8, then a root user can execute this command

Let’s compare the cp command and the cpio command

If you do an apropos or a man page on the commands above, you will spot a few differences. The cp command is used to copy files and directories from source to target location while the cpio command copies files to and from archives. The available options are –a –b –d –f –i –l –L –p and several others. On the other hand, the available options for cpio are –0 –a –A –b –B –C –c –d –E and more.

Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos)

affcopy command

NAME

      affcopy - reorder and recompress AFF files

SYNOPSIS

      affcopy [options] file1 file

      affcopy [options] file1 file2 file3 ... dir

      affcopy [options] file1 file2 file3 ... dir1 dir2...

OPTIONS

General options:

             -d     Print debugging information as well.

             -h     Help, print this message.

             -L     Recompress pages (preen) with LZMA (smaller but slower).

             -m     Just copy the missing segments.

bcopy command

NAME

      bcopy - copy byte sequence

SYNOPSIS

      #include <strings.h>

      void bcopy(const void *src, void *dest, size_t n);

DESCRIPTION

      The bcopy() function copies n bytes from src to dest.  The result is correct, even when both areas overlap.

RETURN VALUE

      None.

cifssd command

NAME

      cifsdd - convert and copy a file over SMB

SYNOPSIS

      cifsdd [OPERAND]...

      cifsdd OPTION

DESCRIPTION

      This tool is part of the samba(7) suite.

      Copy a file, converting and formatting according to the operands.

      bs=BYTES

          read and write up to BYTES bytes at a time (default: 4096)

      ibs=BYTES

          read up to BYTES bytes at a time (default: 4096)

      obs=BYTES

          write BYTES bytes at a time (default: 4096)

To find commands with "copy" in their name or description, I used `man -k copy`.Commands executable only by the root user are indicated by "(8)" at the beginning of their manual page descriptions.Comparing `cp` and `scp`: `cp` provides a concise summary, while `scp` offers detailed information.Read the manual pages for `rsync`, `mv`, and `tar` using `man rsync`, `man mv`, and `man tar`, respectively.

To find all the commands that have the word "copy" in their name or description, I would use the `man` command with the `-k` option, which is a synonym for `apropos`. The command would be:

man -k copy

This command will search the manual pages for any commands that match the keyword "copy" in their name or description.

Regarding commands that only a root user can execute, they are typically indicated by the presence of "(8)" at the beginning of their manual page descriptions. For example, if a command is only executable by the root user, its manual page description might start with "(8) -". The number 8 indicates that it is a system administration command.

As for comparing the info and manual pages of two commands, let's consider the `cp` and `scp` commands:

1. cp (1):

Info Page: Provides detailed information on how to use the `cp` command, including its syntax, options, and examples.Manual Page: Offers a concise summary of the `cp` command, its usage, and available options.

2. scp (1):

Info Page: Gives an overview of the `scp` command, its usage, and options, along with examples and related concepts.Manual Page: Provides detailed information on the `scp` command, including its syntax, options, and usage scenarios.

For the remaining three commands, I will choose `rsync`, `mv`, and `tar`. Let's access and read their manual pages:

man rsync

man mv

man tar

These commands are often used for file and directory manipulation, backups, and archiving, which are essential tasks for a network administrator.

. True or false: Customers who conduct online banking on their laptops or personal computers must use Hypertext Transfer Protocol Secure (HTTPS), the secure and encrypted version of Hypertext Transfer Protocol (HTTP) browser communications. HTTPS encrypts Web page data inputs and data through the public Internet and decrypts that Web page and data on the user’s PC or device.

Answers

Answer:

True

Explanation:

The Hypertext Transfer Protocol Secure (HTTPS) encrypts the data exchanged between computers.

In this case, between a user's computer and their bank.

The data is encrypted so if anyone is "listening" on the data stream, they'll be able to intercept some the exchange, but it will all be encrypted so they're won't be able to read the information exchanged.

HTTPS has become the standard protocol for all secure transactions, not only with banks but with online stores as well.

The statement is true. HTTPS is required for online banking to secure the communication between a user's device and the bank's servers, ensuring that sensitive data is encrypted during transmission.

Customers who engage in online banking on their laptops or personal computers must use Hypertext Transfer Protocol Secure (HTTPS), which is the encrypted version of Hypertext Transfer Protocol (HTTP). HTTPS ensures that data, such as passwords and other identifiers, transmitted between a user's device and the banking server is encrypted during the transfer. This encryption protects the content of your communications from being intercepted or read by unintended actors.

While HTTP transmits information unencrypted, HTTPS, indicated by the presence of an appended 's' in the web address, uses encryption protocols like the Diffie-Hellman key exchange to secure communications. Therefore, only the user's device and the banking website's servers can decrypt and access the transmitted web page data and inputs.

A blue compressor clutch indicates that it's been slipping due to too

Answers

Final answer:

A blue compressor clutch indicates that it's been slipping due to too much friction. To address this issue, one might need to replace the clutch and ensure proper belt tension and lubrication.

Explanation:

A blue compressor clutch indicates that it's been slipping due to too much friction. The compressor clutch is a component in a car's air conditioning system that engages and disengages the compressor to control the cooling process. When the clutch slips, it means it is not properly engaging with the compressor, which can result in reduced cooling performance and potential damage to the clutch itself.

To address a slipping compressor clutch, you might need to replace it with a new one. Additionally, checking the belt tension and lubricating it properly can also help prevent clutch slipping. It's always best to consult a professional mechanic for an accurate diagnosis and appropriate solution to the issue.

You will create two classes, one for a box and one for a triangle. Each of the figures, the box and the triangle, will have an offset telling how far they are indented from the edge of the screen. Each figure will also have a size, although the size will be determined differently for a box and a triangle. For a box, the size is given as the width and the height, expressed in the number of characters. Because characters are taller than they are wide, a box will look taller than you might expect when it is written on the screen. For a triangle, the size will be given by its base. The triangle will point up, and the base will be at the bottom. The slope of a side of the triangle is limited to what you get by indenting one character per line. So once the base is chose, you have no choice regarding what the sides of the triangle will be. We also assume that the base size of a triangle must be odd. The following shows a sample of a 5-by-5 box and a triangle with base of size 15. Assuming that the offset 10. The

Answers

I believe it should be

if fred wants to use a common search engine which of the following should he pick?

Answers

Answer:

Google  

Explanation:

Refseek  is an "academic search engine for students and researchers"; therefore, it will only show academic results.

WorldCat  is a search engine for libraries worldwide - "72,000 libraries in 170 countries".

Dogpile fetches results from other search engines such as Google, Yahoo and Bing.

This would mean that Google is the most versatile for doing anything/all of the above.

bob connects to a company web site. His browser indicates that the digital certificate of the web site is valid. This application of encryption is an example of Select one: a. Public key infrastructure b. Use of symmetric keys c. Access Control Lists d. Anti-spyware technology

Answers

Answer:

The answer is a. Public key infrastructure

Explanation:

With Digital Certificates, businesses can utilise the security applications of PKI. Public Key Infrastructure allows a person or an organization to safely and securely exchange data over the internet.  With PKI offering that extra security between communications, we can maintain authentication, confidentiality, and Access Control. Once you have your website set, a Digital Certificate authority will first verify that you own a website and then sign their certificate so it it trusted by internet browsers

What is WorldCat?
A. An international database of libraries and their collections
B. An internet archive that serves as one stop spot for research
C. A database of more than 72,000 documents for education professionalals
D. A source for library and information professionals

Answers

Answer:

Im pretty sure its

D.

Explanation:

WorldCat lets you search the collections of libraries in your/a community WorldCat grows every day because of librarians and other information professionals.

Answer: A. An international database of libraries and their collections

Explanation: An international database of libraries and their catalogs that have registered with WorldCat

The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a Huya wireless bridge, the bulbs can be programmed to emit different tones of white light, from warm, yellow white to vibrant, blue white to any color on the spectrum. The bulbs can also be programmed to blink if they sense an intruder. This is an application of _____.

Answers

Final answer:

The application described is an example of smart lighting, which allows users to control lighting using a smartphone or tablet. Mishiba Huya LED bulbs are a type of smart LED bulbs that can be programmed to emit different tones of white light and blink in response to an intruder.

Explanation:

The application described in the question is an example of smart lighting. Smart lighting refers to lighting systems that can be controlled remotely using a smartphone or tablet. This technology allows users to adjust the color and intensity of the light, as well as program it to perform specific functions, such as blinking in response to an intruder.

The Mishiba Huya LED bulbs mentioned are an example of smart LED bulbs, which are becoming increasingly popular for both residential and commercial lighting due to their versatility and energy efficiency.

By using smart lighting, consumers can create customized lighting experiences and reduce energy consumption.

One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of Information​ Interchange). The uppercase letters A through Z are assigned the numbers 65 through​ 90, so A has binary code 1000001 and Z has code 1011010. Lowercase letters a through z have codes 97 through 122​ (that is, 1100001 through​ 1111010). ASCII​ codes, as well as other numerical computer​ output, normally appear without commas. Write the binary code for the letter k.

Answers

Binary code, code used in digital computers, based on a binary number system in which there are only two possible states, off and on, usually symbolized by 0 and 1.

The binary code for the letter  .K 01001011

What is a binary code explain?

Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems. These systems use this code to understand operational instructions and user input and to present a relevant output to the user.

Why is binary code 1 and 0?

Because there are only two valid Boolean values for representing either a logic “1” or a logic “0”, makes the system of using Binary Numbers ideal for use in digital or electronic circuits and systems.

To learn more about binary code, refer

https://brainly.com/question/19596234

#SPJ2

Other Questions
Given: DR tangent to Circle O.Ir DB=140, then A=A)70B)110C)140D)80The quiz says 140 is wrong, but I dont know if thats a problem on the teachers end or not, because everyone here says its 140 A student solved this problem and said the answer is 81 2 pounds. Jill's club bought 42 5 pounds of hot dogs, 31 2 pounds of hamburger, and 23 10 pounds of chicken for the picnic. How much meat did they buy altogether? Is the student's answer reasonable? No, the answer is not reasonable. It should be about 12 pounds. No, the answer is not reasonable. It should be about 15 pounds. No, the answer is not reasonable. It should be about 10 pounds. Yes, the answer is reasonable. Weights of Andrews cats are 8 pounds, 15 pounds, 18 pounds, 15 pounds, and 12 pounds. Which statements are true about the weights of Andrews cats? Select the four that apply. A. The mean is 13.6 pounds B. The median is 16 pounds C. The range is 10 poundsD. The mode is 15 poundsE. The mean is greater than the medianF. The median and the mode are the same If an object moves faster and faster, what must change? (1) 1 UU15. Line segment RW has endpoints R(4, 5) and W6, 20). Point P ison RW such that RP:PW is 2:3. What are the coordinates of point P?(1) (2,9) (2) (0, 11) (3) (2, 14) (4) (10,2)14 Subtract: (2x3+7x24)(2x2+4x10) Simon draws a diagram to illustrate the law of reflection.Which best explains how Simon can correct the error in his diagram?Draw the incident ray so it is longer than the reflected ray. Make the angle of reflection and the angle of incidence equal.Switch the labels for incident ray and reflected ray. Make the angle of incidence larger than the angle of reflection. Solve for x2(x+1)=8Provide step by step instructions I have vitiligo patches on my underarms, my feet and my genitals. Is this common? please help me i dont get it at all Approximately how many kg of carnivore biomass can be supported by a field plot containing 1,000 kg of plant material?A) 10,000B) 1,000C) 100D) 10E) 1 A magazine has a total readership of 750,000; 65 percent of readers report seeing a company's advertisement in one issue. The cost of the ad was $97,500. Calculate the cost per customer. List 5 types of food that should be consumed Dailey in a healthy diet. Give an example of each type 4y^2 - 37 = 27, what is the positive value of y? Solve the equation for x.the square root of the quantity x minus 6 end quantity plus 3 equals 10A. x=1B. x=13C. x=43D. x=55 Suppose you have to move a heavy crate of weight 875 N by sliding it along a horizontal concrete floor. You push the crate to the right with a horizontal force of magnitude 300 N, but friction prevents the crate from sliding. What is the magnitude Fp of the minimum force you need to exert on the crate to make it start sliding along the floor? Let the coefficient of static friction ?s between the crate and the floor be 0.56 and that of kinetic friction, ?k, be 0.47. Which inequality best represents that ice cream at 5C is cooler than ice cream at 4C? How does the opening of this story echo a common Biblical storyline?A)Faith is clearly a temptress designed to trap Goodman Brown in a sinful situation.B)Young Goodman Brown's wife very much resembles nagging behaviors of Job's wife in stories from the Bible.C)The set-up of this story is a direct allusion to the sibling rivalry that existed between Cain and Able in the Bible.D)Goodman Brown's decision to go into the wilderness echoes Jesus (and other prophets) going into the wilderness to be tempted by evil.its d!!!! Neils Bohr published his model of the atomic structure in 1913. He introduced the theory of electrons traveling in orbits around the atom's nucleus, with electrons orbiting only in certain orbits called shells. Each shell can contain a fixed number of electrons.According to this model of the atom, the chemical properties of an element are mainly determined by A) the number of electrons in the outer shells. B) the number of electrons in the inner shells. C) the total number of electrons in all shells. D) the difference between number of electrons and protons. Elim Which inequality represents thefollowing situation times 5 lessthan a number is no more than 27? Steam Workshop Downloader