In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose is

Answers

Answer 1

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:


Related Questions

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?

Compatibility Checker
Accessibility Checker
Insights
AutoCorrect

Answers

Answer:

Accessibility Checker

Answer:

answer is accessibility checker or B on edge

Write a program that reads a stream of integers from a file and prints to the screen the range of integers in the file (i.e. [lowest, highest]). You should first prompt the user to provide the file name. You should then read all the integers from the file, keeping track of the lowest and highest values seen in the entire file, and only print out the range of values after the entire file has been read.

Answers

Answer:

This question is answered using C++ programming language

#include <fstream>

#include<iostream>

using namespace std;

int main() {

  string fname;

  cout<<"Enter Filename: ";

  cin>>fname;

  int lowest = 0;

int highest = 0;

  ifstream ifs(fname);

  int x;

  while (ifs >> x){

  if(x < lowest){

   lowest= x;

  }

  if(x > highest) {

   highest = x;

  }

  }

  ifs.close();    

  for(int i = lowest; i<=highest;i++)

  {

   cout<<i<<" ";

  }

     

}

Explanation:

This line declares fname as string  

string fname;

This prompts user for filename

  cout<<"Enter Filename: ";

This gets filename

  cin>>fname;

This declares and initializes lowest to 0

      int lowest = 0;

This declares and initializes highest to 0

int highest = 0;

This defines the file using ifstream

  ifstream ifs(fname+".txt");

This declares x as integer. x is used to read integers in the file

  int x;

The following iteration will be repeated until there is no other integer to be read from the file

  while (ifs >> x){

This checks for lowest

  if(x < lowest){

   lowest= x;

  }

This checks for highest

  if(x > highest) {

   highest = x;

  }

  }

This closes the file. i.e. the file has been read

  ifs.close();    

The following iteration prints the range of values from lowest to highest

  for(int i = lowest; i<=highest;i++)  {

   cout<<i<<" ";

  }  

Please note that the filename must be entered with its extension

Krista needs to configure the default paste options in PowerPoint 2016. Which area of the Options dialog box will she need to use to configure these options?

Proofing
General
Save
Advanced

Answers

Answer:

[tex]\red{\underline{\underline{\sf{Answer :-}}}} [/tex]

Advanced

Answer: General

Explanation:

The Boolean operators include which of the following?

A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not

Answers

Answer:

The answer is A. and, or, not

Explanation:

Using a Boolean search can help narrow your results. A Boolean search is a query that uses the Boolean operators AND, OR, and NOT, along with quotation marks, to limit the number of results. For example, searching the terms Alexander the Great AND conquests will provide results about Alexander, great, and their conquests.

Denise is using Outlook 2016 in a business environment. Her company operates a Microsoft Exchange email server.

When Denise uses the address book, which tool is she using by default?

Offline Address Book
Personal Address Book
Global Address List
Custom Address List

Answers

Answer:

Custom Address link

Explanation:

Answer:

D custom address list

Explanation:

Edge 202

Writea SELECT statement that uses the ranking functions to rank products by the total quantity sold. Returnthese columns:The product_name column from the Products tableA column named total_quantity that shows the sum of the quantity for each product in theOrder_Items tableA column named rank that uses the RANK function to rank the total quantity in descending sequenceA column named dense_rank that uses the DENSE_RANK function to rank the total quantity in descending sequence

Answers

Answer:

SELECT  product_name, SUM(DISTINCT quantity) AS total_quantity

RANK() OVER (PARTITION BY total_quantity ORDER BY product_name) AS rank,

DENSE_RANK () OVER (ORDER BY quantity DESC) AS dense_rank

FROM Order_items

JOIN products ON Order_items.product_id = products.product_id

GROUP BY product_id

Explanation:

The SQL query returns four columns namely, product name, total quantity, rank and dense rank. The query uses the rank and the dense rank function to return the rows according to numeric ranks.

dad always arrives home from work thoroughly exhausted​

Answers

Yes plz explain your answer

Course Aggregation Many times, departments are only interested with how students have done in courses relative to a specific major when considering applicants for admission purposes.
For this problem you are given a dictionary where the keys are strings representing student ids and the values are dictionaries where the keys represent a course code and the value represents a grade. Your task is to write a function that given a dictionary of the described format and a prefix for course codes, return a dictionary where each key is a student id and the corresponding value is the average grade of the student only in courses that start with the given prefix.
def course_grader (student_to_grades, course_prefix): ({str, {str, float}}) -> {str, float} I: a dictionary containing the grades of students (as described above) and a course code prefix P: compute and store the average grade of all students only for courses that start with the given course prefix 0: a dictionary of student ids to average grades as described in the Processing step pass

Answers

Answer:

def course_grader(student_to_grades, course_prefix):

   student_grades = dict()

   for key, value in student_to_grades.items():

       grade_score = 0

       for course,grade in value.items():  

           if course_prefix == course:  

               grade_score += grade

                student_grades[key] = grade_score / len(value.keys())

   return student_grades

Explanation:

The course_grader function is a python program that accepts two arguments, the student dictionary and the course prefix. The function returns a dictionary of the student id as the key and the average grade of the student as the value.

hurry i need help swear to god i will give brainliest not lying

Answers

Answer:

finding area of a circle

def area(radius):

   int(radius)

   formula = radius * radius * 3.14

   print(formula)

radius_input = int(input('Insert the radius of your circle: '))

area(radius_input)

hope this helped :D

Which tab should you use to change the text font color in your presentation?

Answers

Answer:

The Home Tab

Explanation:

Consider the following Java program. Describe what it does in response to specific operations of the mouse, and how it does it. (You are encouraged to run the program for yourself to test its behavior. Then read through the program carefully to understand how that behavior arises.)
import java.awt.event.*;
import javax.swing.*;
public class MouseWhisperer extends JFrame implements MouseListener {
MouseWhisperer() {
super("COME CLOSER");
setSize(300,100);
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
addMouseListener(this);
setVisible(true);
}
public void mouseClicked(MouseEvent e) { setTitle("OUCH"); }
public void mousePressed(MouseEvent e) { setTitle("LET GO"); }
public void mouseReleased(MouseEvent e) { setTitle("WHEW"); }
public void mouseEntered(MouseEvent e) { setTitle("I SEE YOU"); }
public void mouseExited(MouseEvent e) { setTitle("COME CLOSER"); }
public static void main(String[] args) { new MouseWhisperer(); }
}

Answers

Answer:

Explanation:

This java code creates a windowed java application that is 300x100 pixels large. The title of the program which is located in the bar at the top of the program starts off by saying "Come Closer". If you move the mouse over the program the program detects it. Then if you press the program it changes the title to "Let Go". If you press the program and immediately let go it changes the title to "Ouch" but if you hold for 1 or 2 seconds and let go it changes the title to "Whew". Finally, if you move the mouse cursor away from the program it changes the title back to "Come Closer"

C++

Write a program that reads in at most 100 integers that are between 1 and 100 and counts the occurrence of each number in the list. Assume the list ends when a zero is inputted.

Answers

Answer:

#include <iostream>

#include <map>  

using namespace std;

int main()

{

   map<int, int> numbers;

   cout << "Enter numbers, 0 to finish" << endl;

   int number;

   while (true) {

       cin >> number;

       if (number == 0) break;

       numbers[number]++;

   }

   for (pair<int, int> element : numbers) {

       std::cout << element.first << ": occurs " << element.second << " times" << std::endl;

   }

}

Explanation:

One trick used here is not to keep track of the numbers themselves (since that is not a requirement), but start counting their occurrances right away. An STL map< > is a more suitable construct than a vector< >.

what type of collection is used in the assignment statement
info: [3:10,4:23,7:10,11:31]

tuple
list
Duque
dictionary ​

Answers

Answer:

The correct answer to this question is given below in the explanation section.          

Explanation:

There are four data types in Python used to store data such as tuple, list, set, and dictionary.

The correct answer to this question is option D: Dictionary

Dictionary data type is used to store data values in key:value pairs as given in the question. It is a collection that is changeable, unordered, and does not allow duplicate entries.

Dictionaries in Python are written with curly brackets and have keys and values such as car={name="honda", model=2010}

when you run the given assignment statment such

info= {3:10,4:23,7:10,11:31}

print(info)

It will print the info dictionary (key:value pair)

{3: 10, 4: 23, 7: 10, 11: 31}

While other options are not correct because:

Tuples in Python are used to store multiple items in a single variable. For example:

info=("apple", "banana", "cherry")

List is used to store multiple items in a single variable. for example

myList = ["apple", "banana", "cherry"]

print(myList)

The list is ordered, changeable, and allows duplicate entry. But you can not put key: value pair in the list.

Deque is a double-ended queue that has the feature to add or remove an element on it either side.

Answer:

Dictionary is the answer

Biodiversity explanation

Answers

the variety of life in the world or in a particular habitat or ecosystem

Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, he discovers an arcade store that pays real cash for every game that the player wins - however, the store will only pay out once per game. The store has some games for which they will pay winners, and each game has its own completion time and payout rate. Thrilled at the prospect of earning money for his talent, Adam walked into the store only to realize that the store closes in 2 hours (exactly 120 minutes). Knowing that he cannot play all the games in that time, he decides to pick the games that maximize his earnings
Sample game board at the arcade GAME COMPLETION TIME (in minutes) PAYOUT RATE Pac-man 90 400 Mortal Kombat 10 30 Super Tetris 25 100 Pump it Up 10 40 Street Fighter II 90 450 Speed Racer 10 40
An acceptable solution is the one where it still picks the best earnings even when the list of games or completion times or payout rates change.
Question:
Write code in Java/Scala/Python to help Adam pick the sequence(s) of games that earn him the most money?.
Then, assume you have a variable list of games and their payout rates. What is the best way to pick the games that earn you the most?
Input Explanation
The first line of input is always an integer denoting many lines to read after the first line. In our sample test case, we have 6 in the first line and 6 lines after the first line, each having a game, completion_time and payout_rate.
In each data line, the game, completion_time and payout_rate are separated by a ','(comma).
The games board may change but the store still closes in 120 minutes.
Input
6
Pac-man,80,400
Mortal Kombat,10,30
Super Tetris,25,100
Pump it Up,10,40
Street Fighter II,90,450
Speed Racer,10,40
Output Explanation
Print the game names that earn him the most into the standard output in alphabetical order
Output
Mortal Kombat
Pump it Up
Speed Racer
Street Fighter II

Answers

Answer:

ask it to ur teacher boiiiiii

In python, Write a function (name: identi Substring) that, given a string S, returns an integer that represents the numbers of ways in which we can select a non-empty substring of S where all of the characters of the substring are identical. Two substrings with the same letters but different in locations are still considered different. For example, the string "zzzyz" contains 8 such substrings. Four instances of "z", two of "zz", one of "zzz" and one instance of "y". String "k" contains only one such substring:"k". The length of S will be between 1 and 100, inclusive. Each character in S will be a lowercase letter (a-z).

Answers

Answer:

def identiSubstring(S):

    n = len(S)

    inst = ""

    count= 0

    for Len in range(1,n+1):

         for i in range(n-Len+1):

              for k in range(i,i + Len):

                   inst =inst+S[k]

              if(len(set(inst)) == 1):

                   count = count + 1

              inst = ""

    return count

           

S = input("Enter a string: ")

if(len(S)>=1 and len(S)<=100):

    print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")

else:

   print("Length is invalid")

Explanation:

This line defines the required function

def identiSubstring(S):

This calculates the length of string S

    n = len(S)

This initializes an instance of the required string to an empty string

    inst = ""

This initializes count to 0

    count= 0

This following iterations iterate through the length of the string

    for Len in range(1,n+1):

         for i in range(n-Len+1):

              for k in range(i,i + Len):

This gets an instance of string S

                   inst =inst+S[k]

This checks if the characters of the instance are identical

              if(len(set(inst)) == 1):

If yes, the counter is incremented by 1

                   count = count + 1

This instance is reset back to an empty string

              inst = ""

This returns the number of instances of the substring

    return count

           

The main begins here

This prompt user for a string

S = input("Enter a string: ")

This checks for valid length

if(len(S)>=1 and len(S)<=100):

If length is between 1 and 100 (inclusive), this calls the identiSubstring function

    print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")

If otherwise

else:

This prints invalid length

   print("Length is invalid")

See attachment

Which of the following scenarios is most likely to give you the shallowest depth of field?
a) 18mm lens at f5.6, subject 20 feet away.
b) 50mm lens at f22, subject 6 feet away.
c) 28mm lens at f4, subject 15 feet away.
d) 85mm lens at f2, subject 8 feet away
50 points and brainliest

Answers

Answer: The answer is B    Hope this helps :)   Please mark Brainliest

Explanation:

dumb question but...for christmas should i get the animal crossing switch or the forrnite one which has a lot and a colored doc? ​

Answers

Answer:

Its your decision but I would go with animal crossing!


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?

Answers

Never store the card-validation code or value (three- or four-digit number printed on the front or back of a payment card used to validate card-not-present transactions). Never store the personal identification number (PIN) or PIN Block. Be sure to mask PAN whenever it is displayed.

Please help this computer science question(Pseudocode and Trace table)

Answers

Answer:

can u explain more specific plz

Explanation:

Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a message to a contact?

Display As
File As
Save As
Full Name

Answers

Answer:

Display as

Explanation:

Need the same question, but that's my guess, because display, means to show.

Answer: file as

Explanation:

correct on edg 2021

Organize the steps involved in the colorization of an old black-and-white photo.

Use dodge, burn, and noise tools.
Restore the old photo.
Adjust the RGB (or CMYK) ratio.
Select the desired area.

Answers

Answer:

How to recolor black and white photos?

Learn how to colorize black and white photos in only 4 minutes

Cleaning the image. When you open the image in Photoshop, convert it to Smart Object and start by removing the scratches and dust. ...

Adjusting the image tones and contrast. If you're working with a sepia image, add a Black & White adjustment layer to neutralize the tones. ...

Converting the image to CMYK. ...

Adding color.

Explanation:

Answer:

1) restore the old photo

2) select the desired area

3) Adjust the RGB (or CMYK) ratio

4) Use dodge, burn, and noise tools

Explanation: correct on Edmentum

One of the following is NOT a basic linked list operation:_________.
a) search
b) insert
c) create
d) delete
e) traverse
f) destroy
g) build list from file

Answers

Answer:

One of the following is NOT a basic linked list operation:_________.

g) build list from file

Explanation:

Linked list operation is the creation of trees and graphs or a chain of data elements, which are called nodes.  Each note points to the next using a pointer.  In linked lists, each node consists of its own data and the address of the next node.  A linked list, which may be single, double, or circular, forms a chain-like structure that builds from one node to the other.

For an interview, the most used microphone types are

A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed

Answers

The answer is A; hope this helps you

explain the major innavotions made from the establishment of abacus​

Answers

Answer:

The summary of that same question would be described throughout the following section.

Explanation:

Specification of simple or rough arithmetic has been accomplished through imaginative technologies with stone blocks, developers have always used computer systems again for the past decades. The varying forms of technology of the 5th generation were indeed desktops, notebooks, or laptops, and they can look at images of pieces of machinery that have been pioneered before today's computer systems.

2. When You buy 4 GB memory unit (pendrive) you
will get memory less than 4 GB?​

Answers

Answer:

Yes.

Explanation:

I believe so, because the pendrive takes some storage for it to actually function. If they wanted it to have exactly 4 GB of memory, they would have to add extra memory.

How can you get access to help? Check all that apply

Answers

Answer:

The answer is "F1"

Explanation:

Please find the complete question in the attachment file.

The F1 key is also known as the function key, which can be used to configure on a device or console key to cause such actions, a form of a soft button, to also be performed by a web browser control parser or software application. The main purpose of the F! key is to open the Help screen for all programs.

g Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.Create a Java program Ex: If the input is: 8 5 2 3 4 10 6 8 9

Answers

Answer:

import java.util.Scanner;

public class Main{

public static void main(String[] args) {

int arraylent;

Scanner input = new Scanner(System.in);

System.out.print("Array Length: ");

 arraylent= input.nextInt();

int[] myarray = new int[arraylent];

for(int i = 0; i<arraylent;i++)

    myarray[i] = input.nextInt();

for(int i = arraylent-1; i>=0;i--)

System.out.println(myarray[i]);

}

}

Explanation:

This declares the length of the array

int arraylent;

This next two lines prompt and get the array length i.e. number of input

System.out.print("Array Length: ");

 arraylent= input.nextInt();

This declares the array as type integer. And the length of the array is gotten from the user input

int[] myarray = new int[arraylent];

This gets the items of the array

for(int i = 0; i<arraylent;i++)

    myarray[i] = input.nextInt();

This reverse and prints the array

for(int i = arraylent-1; i>=0;i--)

System.out.println(myarray[i]);

how to earn money fast in adopt me?

Answers

Become a baby and take care of yourself and pets

Answer:                                                                                                                        If you want money in adopt me quickly, you could become a baby and buy a pet and take care of it and yourself. Also, you could purchase adopt me bucks with robux.

Explanation:

Other Questions
What can you do if your struggling in Volume in Math? PLS HELP ME!! WILL GIVE BRAINLIESTRead the following block of CSS code, and then answer the question.body{position: relative;left: 50px;top: 50px;}What effect would this code have on the display of a box?All content would be placed 50 pixels to the left of the current box.The current box would be located 50 pixels to the left of the page border.The current box would be located 50 pixels to the left of the next page element.The current box would be located 50 pixels to the left of the first textual element. Consider this function.(r) = -3r + 3Which graph represents the inverse of function ? Susana, Mateo y yo _____a la playa ayer.i need the past tense form of the verb IR or Ser please :) What is a letter that is written by someone you know and is used by a college during the application process? Which is not an effective question for launching a historical inquiry related to the US Civil War?A. What effect did Lincolns presidential agenda have on starting the Civil War?B. What influence did the election of 1860 have on the Civil War?C. What role did the institution of slavery play in starting the Civil War?D. What role did the Southern states desire to secede from the Union play in starting the war?E. What was the location of the first significant battle of the Civil War? SOMEONE ANSWER?!!?!?!,!,EMERGENCY Can someone tell me the answer plz plz Ill give you brainlist and points plz This is my final test No wrong answers Divide 350rs in 3:4 ratioplzzz fast What was one advantage Corts had over the Aztec?A. Corts had thousands more warriors than the Aztec.B. Native peoples fought with Corts against the Aztec.C. Corts was more familiar with fighting than the Aztec.D. Allies from Europe fought with Corts against the Aztec. In the parallelogram below,z = [ ? ] PLZ HELPPPP so what is a good gift to get lol if i like your idea ill mark brainly Who served as President of the Republic of Texas following Sam Houston's first term? James K. Polk Anson Jones Mirabeau Lamar Stephen F Austin What are the correct answers? Write the following quadratic equation in equivalent factored form by filling in the blanks. x^2+3x-40 (x - __ )(x + __ ) PLEASE HELP!!!!!!!!!Identify the type for each triangle. (Please do not answer if you do not know so the right people get the points) On a bicycle trail, the city is painting arrows like the one shown below: Upper pointing arrow with height of 15 and length of 13. Rectangular base of arrow has length of 11 and height of 12. All units are in centimeters. Calculate the area of the arrow by decomposing it into rectangles and triangles. Which of the states listed is a peninsula?O CaliforniaO TexasO VirginiaO Florida What are some of your favorite food ? Where do you get the foods? Some ideas 7. Which best describes the narrator's tone in this sentence fromthe last paragraph?"Being wise, their gifts were no doubt wise ones, possiblybearing the privilege of exchange in case of duplication."Plz help again Select all that apply. Which of the following shows that 5/6 = 15/16 is a proportion?