You work for a university and your colleague Mikhail sent you a spreadsheet with student information on it. It has the total number of credit hours they are taking, how many years they’ve been at the school, their email addresses, and their student ID number. In hidden columns it has their social security number and names; Mikhail says this is so no one reading the document can know which name goes with which information. Mikhail is planning on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous. Do you agree? What mistakes has Mikhail made, or what could he do to be more conscientious about sensitive information?

Answers

Answer 1

I do not agree with Mikhail plan on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous.

The mistakes that Mikhail made is not removing those information before sharing it and the thing that he can do is to lock that folder from been access by anyone.

What exactly does data security mean?

Data security is the process of guarding digital data against unauthorized access, corruption, and theft throughout all stages of its life.

Note that Data security refers to safeguarding digital information, such as that contained in a database, against obnoxious users and destructive forces, such as cyberattacks and data breaches.

Therefore, for safety, Place all sensitive data in a safe location. Never leave it unattended on your desk or anywhere that unauthorized people could easily access it. The best place for it to be kept is in a locked file cabinet or drawer. All confidential information may be requested back, or the owner may choose to have it destroyed.

Learn more about data security from

https://brainly.com/question/25720881
#SPJ1


Related Questions

partcipate in workplace meeting and discussions​

Answers

Aser:

Explanación:

para tu rspuesta tiens que explicar que participar en reuniones no es solo discuciones solo aprender de la pregunta

50 POINTS, PLEASE HELP
When President Obama proposed increasing the minimum wage, he argued that a minimum-wage worker today should earn the same amount of money in real terms as a minimum-wage worker in 1979. But why pick 1979? Why not go back to 1938, the first year of the minimum wage? Why not 1999? For each of the years listed below, calculate what the minimum wage would be today if it had kept up with inflation since that year. Today, the minimum wage is $7.25 and the consumer price index (CPI) is 256. (Round your answer to two decimal places.)

Year minimum wage CPI wage today adjusted for inflation
1938 $0.25 14 ?
1979 $2.90 69 ?
1999 $3.80 127 ?

Answers

The minimum wage is highest is 1979 $2.90 69 if it had kept up with inflation since that year.

What is minimum wage?

A minimum wage is the lowest salary that businesses are legally permitted to pay their employees—the price floor below which employees are not permitted to sell their labour. By the end of the twentieth century, most countries had implemented minimum wage legislation. Companies frequently try to bypass minimum wage legislation by hiring gig workers, shifting labour to places with lower or nonexistent minimum wages, or automating job tasks because minimum wages increase the cost of labour. The minimum wage movement began as a means to prevent sweatshop workers from being exploited by employers who were deemed to have unfair negotiating power over them.

To learn more about minimum wage
https://brainly.com/question/26699459

#SPJ1

#For this check-in, your goal is to write an agent that can

#play tic-tac-toe.

#

#How do you code an agent that plays tic-tac-toe? Well, you

#code an agent that plays a single move in a tic-tac-toe game.

#Then, we run a game, passing the board back and forth between

#your agent and an opponent.

#

#So, all you need to do is write a function called move. move

#should have one parameter, a list of lists. The parameter

#will always be a 3x3 list of characters. Every item in the

#3x3 list will be either a space (empty), U (Us), or T (Them).

#We're using U and T instead of X and O so that your agent

#doesn't have to worry about whether it's playing as X or O:

#you always play as U.

#

#Your move function should always return a tuple with two

#integer representing the coordinate where you want to play, row

#then column. For example, returning (0, 0) would play in the

#top left. Returning (0, 2) would play in the top right (row 0,

#column 2). Returning (2, 0) would play in the bottom left (row

#2, column 0). Returning (2, 2) would play in the bottom right

#(row 2, column 2).

#

#Remember, you're only coding an agent to play a single move

#in a tic-tac-toe game; it's given a board and it returns a

#single move. The board it receives might be empty, it might

#be partially-played, or it might have only a single possible

#move remaining. You may assume that the game board is valid

#(e.g. no one has yet won the game).

#

#In order to pass this check-in, all you have to do is write

#an agent that can play a move in any valid board: it never

#tries to play in a spot that has already been played or to

#play a move out of range. Beyond that, it does not matter if

#your agent wins or loses, or how it selects the move to play.



#Add your move() function here!

Please help me, I've been working on this for HOURS and about to cry

Answers

Using knowledge in computational language in python it is possible to write a code that play the game tic tac toe that code an agent that plays a single move in a tic-tac-toe game.

Writting the code:

# tic_tac_toe/logic/models.py

import enum

import re

from dataclasses import dataclass

from functools import cached_property

# ...

dataclass(frozen=True)

class Grid:

   cells: str = " " * 9

   def __post_init__(self) -> None:

       if not re.match(r"^[\sXO]{9}$", self.cells):

           raise ValueError("Must contain 9 cells of: X, O, or space")

   def x_count(self) -> int:

       return self.cells.count("X")

    def o_count(self) -> int:

       return self.cells.count("O")

   def empty_count(self) -> int:

       return self.cells.count(" ")

See more about python at brainly.com/question/18502436

#SPJ1

What is the contribution of 5G and Edge computing to society

Answers

5G increases speeds by up to ten times that of 4G, whereas mobile edge computing reduces latency by bringing compute capabilities into the network, closer to the end user.

Mark as Certified Brainly for more genuine answer.
5G will unlock a broad range of opportunities, including the optimization of service delivery, decision-making, and end-user experience. This will result in $13.2 trillion in global economic value by 2035, generating 22.3 million jobs in the 5G global value chain alone.

Choose the correct term to complete the sentence
A ____ has function that allow you to appendleft and pop left.
O Deck
O amplified list
O deque
O list

Answers

What do you mean by deque?

Image result for deque

Deque is a data structure that inherits the properties of both queues and stacks. Additionally, the implementation of this data structure requires constant time, i.e., time complexity = O(1). This means you can use deque to your advantage to implement both the queue and stack.

----is emerging as the most significat response to the demands of individual learning

Answers

Answer:

The most significant response to the demands of individual learning is the development of personalized learning.

Hacker Rank - Disk Space Analysis
C# solution for HackerRank's Disk space analysis challenge.
Example
For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4 see below
The chunks would be:
[2, 5, 4] -> min: 2
[5, 4, 6] -> min: 4
[4, 6, 8] -> min: 4

Answers

For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4.

What is C#?

You say "C#" instead of "C-Sharp."

It is an object-oriented programming language made by Microsoft that makes use of the.NET Framework.

C# has origins in the C family and is connected to other widely used languages like C++ and Java.

The first iteration was released in 2002. The most recent version of C#, version 10, was released in November 2021.

What is Disk Space Analysis?

An application called a disk space analyzer, also referred to as a storage analyzer, scans your computer and generates a report listing every file that uses disk space, including videos, saved files, program installation files, and more.

The chunks would be:

[2, 5, 4] -> min: 2

[5, 4, 6] -> min: 4

[4, 6, 8] -> min: 4

(1) In this case we just need to compare current number with prev. found minimum, hence code below

s.Push(space[i] < space[peek] ? i: peek);

The prev. found minimum is NOT part of current chunk

(2) In this case we have to loop through current chunk to find the minimum

s.Push(i);

var j = chunkNum;

var count = 0;

while (count++ < x)

{

  if (space[j] < space[s.Peek()])

  {

      s.Pop();

      s.Push(j);

  }

  j++;

}

(3) Find the maximum between found minimums, thanks to LINQ, it is dead easy

s.Select(c => space[c]).Max();

Learn more about C# click on this link:

https://brainly.com/question/28184944

#SPJ4

Write a program to input student's
name,marks obtained in four different
subjects, find the total and average marks in Qbasic

Answers

The program to input the student's name and marks obtained in four different subjects, find the total and average marks in Qbasic:

CLS

INPUT " Student Name ";  S

INPUT " English Marks ";  EM

INPUT " Maths Marks "; MM

INPUT " History Marks "; HM

INPUT " Geography Marks "; GM

INPUT " Marks in Total "; MT

LET TMS = EM + MM + HM + GM

LET p = TMS / MT * 100

PRINT " Student name is "; S

PRINT " Total "; TMS

PRINT " Percentage " ; p

END

What is QBasic?

QBasic is an integrated programming environment and interpreter for a number of QuickBASIC-based BASIC dialects. When code is entered into the IDE, it is first compiled into an intermediate representation (IR), which the IDE then executes on demand.

QBasic is incredibly simple to learn, use, and can construct corporate applications, games, and even basic databases. It provides commands like SET, CIRCLE, LINE, and others that let programmers draw using Qbasic.

To learn more about QBasic, use the link given
https://brainly.com/question/20702575
#SPJ1

What type of attack is occurring when a counterfeit card reader is in use

Answers

Answer:

skimming

Explanation:

skimming is the term that means to capture credit card info from a counterfeit card reader.

Computers are used more extensively than ever for tasks such as banking,
investing, shopping and communicating. Do you see this trend as having a
positive or a negative impact on our society and economy? Give reasons to
support your answer.

Answers

More people than ever utilize computers for everyday functions including banking, investing, shopping, and chatting. I think that this trend is having a negative effect on our society and economy. I think so because although our lives have been made easy by the computer doing such tasks for us, in later years technology will be so advanced that we wouldn't even have to lift a finger to do anything and if something happens to the computers who are doing our tasks for us, our bodies and minds won't be able to have the same strength it once had when these tasks were done manually by us. Even the jobs of many will be lost and there will be a lot of poverty if these computers take over the jobs of people doing these tasks manually. These are my reasons for this trend having a negative impact on our society and economy.

How has technological advancement affected our world?

Our world and way of life have undergone a transformation thanks to technology. In addition, technology for seniors has produced incredible tools and resources that have put practical information at our fingertips.

Multipurpose devices like smartphones and smartwatches are now possible thanks to modern technology. Nowadays, computers are more powerful, portable, and faster than ever. Along with all of these breakthroughs, technology has contributed to making our lives easier, faster, better, and more fun.

To learn more about technology, use the link given
https://brainly.com/question/25110079
#SPJ1

Assume planets is an ArrayList of Strings and it currently contains several elements. Also assume a String variable named first has been declared. Write a statement that will assign the first element of the ArrayList to the first variable.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Assume planets is an ArrayList of Strings and it currently contains several elements.

Writting the code:

ArrayList<Integer> intList=new ArrayList<Integer>();

   intList.add(1);

   intList.add(2);

ArrayList<String> strList=new ArrayList<String>();

   strList.add("Terra");

   strList.add("Marte");

   strList.add("Venus");

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a C++ program to generate the multiplication table of a number (entered by
the user) using While Loop

Answers

#include <iostream>

int main(int argc, char* argv[]) {

   int number, c=1; std::cin>>number;

   while(c<11) {

       std::cout << number << "x" << c << "=" << number*c << std::endl;

       c++;

   }    

   return 0;

}

Can you explain the process for this problem please.

num = 120

while num > 0:

digit = num % 10

print(digit, end='')

num //= 10

Answers

Answer:

Looks like a number reverser

Explanation:

The loop copies the last digit, prints it, then removes it by dividing by 10.

Without using parentheses, enter a formula in C4 that determines projected take home pay. The value in C4, adding the value in C4 multiplied by D4, then subtracting E4.

HELP!

Answers

Parentheses, which are heavy punctuation, tend to make reading prose slower. Additionally, they briefly divert the reader from the core idea and grammatical consistency of the sentence.

What are the effect of Without using parentheses?

When a function is called within parenthesis, it is executed and the result is returned to the callable. In another instance, a function reference rather than the actual function is passed to the callable when we call a function without parenthesis.

Therefore, The information inserted between parenthesis, known as parenthetical material, may consist of a single word, a sentence fragment, or several whole phrases.

Learn more about parentheses here:

https://brainly.com/question/26272859

#SPJ1

Prepare an algorithm and draw a corresponding flowchart to complete the sum and product of all prime numbers between 1 and 50

Answers

Using the knowledge in computational language in python it is possible to write a code that Prepare an algorithm and draw a corresponding flowchart to complete the sum and product of all prime numbers between 1 and 50.

Writing the code;    

using Lisp GNU Common Lisp (GCL) GCL 2.6.12  

Distributed under the GNU Public License. See the file COPYING.  

Dedicated to the memory of William Schelter.  

The function bug_report() provides bug reporting information.  

(%i1) primep(45);  

(%o1)  false  

(%i2) primep(11);  

(%o2)  true  

(%i3) primep(31);  

(%o3)  true  

(%i4)  

#!/usr/bin/env luajit

local bit = require("bit")

local band, bxor = bit.band, bit.bxor

local rshift, rol = bit.rshift, bit.rol

local m = tonumber(arg and arg[1]) or 100000

if m < 2 then m = 2 end

local count = 0

local p = {}

for i=0,(m+31)/32 do p[i] = -1 end

io.write(string.format("Found %d primes up to %d\n", count, m))

See more about python at brainly.com/question/12975450

#SPJ1

8
What is a serial advanced technology attachment (SATA) cable used for?
O A.
to connect storage devices to the motherboard
to connect RAM to the CPU
to connect the heat sink to the motherboard
OB.

Reset
Next

Answers

SATA is used to know how data is transferred

What is SATA?

Hard disc drives (HDDs), optical drives, and solid-state drives are examples of mass storage devices. Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

features of SATA:

Serial SATA controller hardware, which also controls data flow, is used to link HDDs and SSDs to a computer's motherboard. The hard disc may be detected as a PATA device when SATA is in IDE mode. Performance is compromised, but the arrangement makes it easier to use with older technology.

Performance is improved when a SATA controller is set to Advanced Host Controller Interface (AHCI) rather than IDE mode. The hot switching of discs and external interfaces is supported by AHCI. Both AHCI capabilities and RAID data security features are supported by the RAID mode.

Hence to conclude using SATA we can increase the performance

To know more on SATA please follow this link

https://brainly.com/question/29035982

#SPJ9

Which are behaviors to avoid in the computer classroom? Select 3 options.
Responses

Answers

The three examples of behaviors to avoid in the computer classroom include the following:

drinking a soda. changing the cords connected to the computer. opening emails from strangers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

Monitor screenMouseKeyboardMotherboardSpeakers.Hard-disk drive

In a computer classroom, it is very important for all students to avoid taking or drinking any form of drink such as soda, water, etc., because it could spill on the computer hardware and damage it or cause electrocution. Additionally, students should avoid opening email sent by strangers and changing the cables (cords) that are used for computer connections.

Read more on computers here: brainly.com/question/14614871

#SPJ1

Complete Question:

Which are behaviors to avoid in the computer classroom? Select 3 options.

drinking a soda

changing the cords connected to the computer

treating others the way you would like to be treated

opening emails from strangers

What is edge computing?
O moving large amounts of data closer to the center of the Cloud
O using "cutting-edge" technology to create more powerful computers
O putting computing closer to the users and devices creating data
O making decisions based on predetermined high-level data forecasts
O I don't know this yet.

Answers

Moving large amounts of data closer to the center of the Cloud is termed as Edge Computing because Edge is about processing data more quickly and in greater volume close to the point of generation, enabling action-driven results in real time.

What is Edge Computing?

A variety of networks and devices that are at or close to the user are referred to as edge computing, an emerging computing paradigm.

Edge is about processing data more quickly and in greater volume close to the point of generation, enabling action-driven results in real time.

A distributed computing framework called edge computing brings business applications closer to data sources like IoT gadgets or regional edge servers.

Strong business advantages, including quicker insights, quicker response times, and better bandwidth availability, can result from being close to the source of the data.

To know more about Edge Computing, visit: https://brainly.com/question/23858023

#SPJ9

A teacher has five students who have taken four tests. The ten her uses the following grading scale to assign a letter grade to a student, based on the average of his or her four test scores:
Write a class that uses a string array to hold the five students' names, an array of five characters to hold the five students' letter grades, and five arrays of four doubles each to hold each student's set of test scores. The class should have methods that return a specific student's name, the average test score, and a letter grade based on the average.
Demonstrate the class in a program that allows the user to enter each student's name and his or her four test scores. It should then display each student's average test score and letter grade.
Input Validation: Do not accept test scores less than zero or greater than 100.

Answers

The program for the class will be:

import java.util.Scanner;

class Gradecalculator

{

static String [] names=new String[5];

static char [] grades=new char[5];

static double [][] testscore=new double[5][4];

protected char[] calculate(double [][] testscore)

{

double total[]=new double[5];

for(int i=0;i<5;i++)

{

for(int j=0;j<4;j++)

{

total[i]=0;

}

}

for(int i=0;i<5;i++)

{

for(int j=0;j<4;j++)

{

total[i]=total[i]+testscore[i][j];

}

}

for(int i=0;i<5;i++)

{

total[i]=total[i]/4;

}

for(int i=0;i<5;i++)

{

if(total[i]>=90&&total[i]<=100)

grades[i]='A';

else if(total[i]>=80&&total[i]<90)

grades[i]='B';

else if(total[i]>=70&&total[i]<80)

grades[i]='C';

else if(total[i]>=60&&total[i]<70)

grades[i]='D';

else

grades[i]='F';

}

return(grades);

}

}

public class Grade extends Gradecalculator {

public static void main(String[] args) {

Scanner sc=new Scanner(System.in);

Grade ob=new Grade();

System.out.println("enter the name of students");

for(int i=0;i<5;i++)

{

System.out.println((i+1)+"student");

names[i]= sc.nextLine();

}

System.out.println("enter the test scores of students");

for(int i=0;i<5;i++)

{

System.out.println("STUDENT "+(i+1));

for(int j=0;j<4;j++)

{

System.out.println("TEST "+(j+1));

testscore[i][j]=sc.nextDouble();

if(testscore[i][j]>100)

{

System.out.println("in appropriate value TRY AGAIN");

j--;

continue;

}

}

}

System.out.println

("OK INPUT COMPLETE WANT TO KNOW THE FULL RESULTS Y/N");

String resp=sc.next();

ob.calculate(testscore);

if(resp.equals("Y"))

{

System.out.println("------------DISPLAYING RESULTS-----------") ;

System.out.println("STUDENT NAME \t\t GRADES");

for(int i=0;i<5;i++)

{

System.out.println(names[i]+"\t\t"+grades[i]);

}

System.out.println("want to check individual scores \n enter the student number");

int n=sc.nextInt();

try

{

System.out.println("STUDENT NAME "+names[n-1]+" GRADES "+grades[n-1]);

System.out.println("INDIVIDUAL TEST SCORES");

for(int i=0;i<4;i++)

{

System.out.println(testscore[n-1][i]);

}

}

catch(Exception e)

{

System.out.println("this student does not exist");

}

}

else

{

System.out.println("CLOSING");

}

}

}

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute.

Software includes computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form.

In this case, the class in a program that allows the user to enter each student's name and his or her four test scores is illustrated.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

What method would you use to search a number in an organized array of number​

Answers

The method that can be used to search a number in an organized array of numbers would be the "sequential search algorithm."

What is an array? What is it used for?

A collection of elements, each of which is identified by at least one index or key, is referred to as an array in computer science. Each element of an array is recorded such that a mathematical formula can be used to determine its position from its index tuple.

When several variables of the same type must be used, arrays are employed. It is used to hold a collection of data, although it is more helpful to see an array as a group of variables of the same type. You can declare and use arrays. The types and quantity of items that must be included for an array must be specified by the programmer.

Solution Explained:

The sequential search algorithm is the simplest method to search for a number in an organized array since the function checks each element in the array, starting from the first and ending with the last one, to see if it matches the desired value. As soon as a match is discovered, the function returns the index of the element whose value corresponds to the desired value.

To learn more about an array, use the link given
https://brainly.com/question/28061186
#SPJ1

Write a program that prompts the user for their age and determines if they are a teenager. Someone is a teenager if their age is greater than or equal to 13 and less than or equal to 19.

Answers

Using the knowledge in computational language in python it is possible to write a code that  prompts the user for their age and determines if they are a teenager.

Writting the code:

from datetime import date

todayDate = date.today();

DOB = input("Please enter your Date of Birth: ");

currentYear = todayDate.year;

age = (int(currentYear) - int(DOB));

print(f'Your current age is: {age}');

print ("\n")

if age <= 5:

   print("You are a baby.")

elif age >= 5 and age < 13:

   print("You are a toddler")

elif age >= 13 and age < 18:

   print("You are an teenager")

elif age >= 18 and age < 60:

   print("You are an adult.")    

elif age >= 60:

   print("You are a senior Citizen")

See more about python at brainly.com/question/18502436

#SPJ1

Which network configuration would be typical of a private deployment model?

A) IP address: 10.0.0.20
B) IP addresses: 10.0.0.20 and 54.238.123.12

Answers

A network configuration would be typical of a private deployment model is: A) IP address: 10.0.0.20.

What is an IP address?

In Computer technology, an IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a network device such as a computer, website or other network devices such as routers, switches, etc., in order to successfully differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4).Internet protocol version 6 (IPv6).

In this scenario, the IP address: 10.0.0.20 is an internet protocol (IP) address which most likely represent a private deployment model that can be used in homes.

Read more on IP address here: brainly.com/question/13590517

#SPJ1

What does the #NULL error in a cell mean?

There are plus signs in the formula.
The value is multiplied by zero.
The value is close to zero.
The answer does not exist.

Answers

Answer:

The answer does not exist

Explanation:

Other guy is wrong lol

The #NULL error in a cell mean there are plus signs in the formula. Thus, option A is correct.

What happens when file opens?

If we try to open a file for reading when that file does not exist, we will get an error message. For example, in Java we will encounter a FileNotFoundException as in the code below:

try {

FileInputStream fis = new FileInputStream("myFile.txt");

DataInputStream dis = new DataInputStream(fis);

BufferedReader br = new BufferedReader(new InputStreamReader(dis));

String str = null; while ((str = br.readLine()) != null) {

If the file myFile.txt does not exist we can expect to see an exception stack trace corresponding to FileNotFoundException. Procedural programming is a type of computer programming language that specifies a series of well structured steps and procedures  within its development period of time.

It contains a systematic order of statements, functions and commands to complete a computational task or program. It is centered on creating procedures.

Therefore, The #NULL error in a cell mean there are plus signs in the formula. Thus, option A is correct.

Learn more about programming on:

https://brainly.com/question/3224396

#SPJ2

How can you add pictures to your presentation?

Group of answer choices

Select the Effect Options command.

Select the Picture icon on your slide.

Select the Text Box option.

Select the Variants group in the Picture tab.

Answers

The way that you add pictures to your presentation is by option C: Select the Text Box option.

How may images be added to a presentation?

After clicking the image, select the Format Picture tab. Select Picture Effects, then point to a certain effect type before selecting the desired effect. Click Options at the bottom of any effect menu to customize the effect.

Therefore, One can also do so by:

Choose a spot on the slide and click to insert the image there.Select Pictures from the Images group on the Insert tab, then select This Device.Navigate to the image you wish to insert, click it in the dialog box that appears, and then select Insert.

Learn more about presentation  from

https://brainly.com/question/24653274
#SPJ1

The university student registration system is unable to cope with the high volume of telephone calls received at registration time. An online student registration system needs to be developed.


1. Perform a system investigation and analyze the system to determine the requirements (operational, functional, hardware, software, input, process, output, etc.) for such a system. (everything required in written no software will use)

Answers

The university student registration system is unable to cope with the high volume of telephone calls received at registration time. Among others, busy signals and long distance charges are inherent problems of the telephone registration system.

An online student registration system needs to be developed. In addition, students on campus, off campus, in-state, out of state, and out of country can easily and inexpensively take advantage of many of the services provided by the Office of the Registrar, which today require users to be on campus during business hours.

What is System investigation

System Investigation is the process of finding out what the system is being built to do and if the system is feasible. I

t is the process of finding out what the system is being built to do and if the system is feasible. This will help gain an understanding of the technical resources of the organization and their applicability to the needs of the system.

System Analysis and Design - Overview:

Systems Analysis:

It is a procedure for gathering and analyzing data, determining the issues, and breaking down a system into its constituent parts.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Analysis lays out the system's proper course of action.

Systems Design:

Planning a new business system or replacing an existing system involves defining its modules or components to meet the necessary requirements. Prior to making any plans, it is essential to have a thorough understanding of the current setup and decide how to make the most effective use of computers.

To know more about System investigation, visit: https://brainly.com/question/14682150

#SPJ9

What did this command do?
mv ../* .cpp .
(In linux ubuntu)

Answers

Using the knowledge in computational language in linux it is possible to write a code that located in different directories and  files matching that glob exist.

Writting the code:

# REPLACES: mv /data/*/Sample_*/logs/*_Data_time.err /data/*/Sample_*/logs/*_Data_time_orig.err

for f in /data/*/Sample_*/logs/*_Data_time.err; do

 mv "$f" "${f%_Data_time.err}_Data_time_orig.err"

done

# REPLACES: cp /data/*/Sample_*/scripts/*.sh /data/*/Sample_*/scripts/*_orig.sh

for f in /data/*/Sample_*/scripts/*.sh; do

 cp "$f" "${f%.sh}_orig.sh"

done

# REPLACES: sh /data/*/Sample_*/scripts/*_orig.sh

for f in /data/*/Sample_*/scripts/*_orig.sh; do

 if [[ -e "$f" ]]; then

   # honor the script's shebang and let it choose an interpreter to use

   "$f"

 else

   # script is not executable, assume POSIX sh (not bash, ksh, etc)

   sh "$f"

 fi

done

See more about linux at brainly.com/question/1512214

#SPJ1

Suppose you work for a company that has just hired a new senior vice president. After reviewing the budgets of all departments, the new VP went on record saying that the amount of money spent on cybersecurity is too large in proportion to the size of the company. She recommends an immediate 23 percent reduction in the cybersecurity budget. she has decided on this amount after informal conversations with other companies that have about the same number of employees. However, these other companies perform completely different functions: one company is in manufacturing while the other is a service organization, neither of which is the same as your company. The new VP says she will retract her recommendation if someone can prove that there have been no significant attacks due to the money spent on cyber defenses and not just because your company is unattractive to threat actors

Answers

Spending on cybersecurity is critical for any business. The cybersecurity budget must be sufficient to keep unauthorized users from stealing the company's assets and sensitive data.

What is cyber security about?

Cyberattacks are becoming more common and sophisticated, and the cost of these targeted attacks, whether hardware or software-based, can be devastating for any company.

However, there is no hard and fast rule for determining how much should be spent on cyber defenses; it depends on the sensitivity of data stored in databases, the amount of data that must be shared among business units, the type of firm (e.g., manufacturing or service), and so on.

I recommend that this VP consider key performance indicators (KPIs) such as the number of data breaches, phishing attacks, and similar occurrences, as well as the cost of investigating, removing threats, and restoring/replacing. These figures are published by the FBI and are available on the internet. They may, however, define cyber security spending differently than your organization, which may skew the results.

Learn more about cyber security on:

https://brainly.com/question/28004913

#SPJ1

The index of a book is found in one of these parts of the

Answers

Answer: Located in the back of the book, an index helps a reader locate key terms, concepts, and ideas that were referenced in the contents of your book. Each term or concept has a corresponding page number.

Explanation:

Which of the following statements is false? a javascript identifier

a is case-sensitive
b. can start with a $ sign
c. can start with a number
d. can be more than 128 characters long

Answers

The statement that is false about javascript identifier is option C: can start with a number

What makes an identifier in JavaScript valid?

A variable, function, or property's identifier is a string of characters in the code. Identifiers in JavaScript can contain Unicode letters, $, _, and digits (0–9) but cannot begin with a digit. They are also case-sensitive. 20

Therefore, Generally speaking, a JavaScript identifier begins with a letter, an underscore (_), or a dollar symbol ($). The following characters may also be numbers ( 0 – 9 ). Because of the case sensitivity of JavaScript, letters consist of the characters A through.

Learn more about javascript identifier from

https://brainly.com/question/28822900
#SPJ1

Write a C++ program, which can ask user for login credentials, using Nested If-else
Statement. (Note: Code must have more than one Username support), also ask user for
another entry using do-while loop.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that write a program that ask user for login credentials, using Nested If-else Statement.

Writting the code:

#include <iostream>

#include <cctype>

#include <string>

#include<fstream>

using namespace std;

/*Implements a method to validata the password*/

bool validatePasswordProcess(char passwordValidate[]);

/*main program*/

int main()

{

/*declares the varibles*/

const int SIZEVAL = 7;

char passwordValidate[SIZEVAL];

string UserName,lineFile;

/*declares the file variable*/

ifstream userFile;

/*opens the file*/

userFile.open ("users.txt");

/*Entering the user name*/

cout<<"Enter UserName:";

/*Getting the user Name*/

cin>>UserName;

/*checks whether the file is open*/

if(userFile.is_open())

{

/*getting the lines*/

while(getline(userFile,lineFile))

{

/*printing the data in the file*/

//cout<<lineFile<<endl;

}

/*checks the end of file*/

while(!userFile.eof())

{

/*compares the username*/

if(UserName.compare(lineFile)==0)

{

/*prints the message*/

cout<<"UserName is available";

}

}

}

/*else statement*/

else

{

/*prints the message*/

cout<<"UserName not found";

exit(1);

}

/*Getting the password for validation*/

cout << "PLEASE ENTER A PASSWORDVALIDATE THAT'S 8 CHARACTERS LONG " << endl;

cout << "AND AT LEAST ONE UPPER AND LOWERCASE LETTER " << endl;

cout << "AND ALSO AT LEAST ONE DIGIT " << endl;

/*Getting the password*/

cin >> passwordValidate;

/*checks the password Length*/

if (strlen(passwordValidate) < 8)

{

/*password validation message*/

cout << "PASSWORD NOT LONG ENOUGH, PLEASE TRY AGAIN";

cin >> passwordValidate;

}

/*calls the validatePassword function*/

if (validatePasswordProcess(passwordValidate))

cout << "THAT'S A VALID PASSWORDVALIDATE";

/*closing the file*/

userFile.close();

return 0;

}

/*Implements the nethod for validating the password*/

bool validatePasswordProcess(char passwordValidate[])

{

/*Declares the variables*/

int countValue;

int upperCase = 0;

int lowerCase = 0;

int digitCompute = 0;

/*loop to check through each of the validation*/

for (countValue = 0; countValue < 6; countValue++)

{

/*checks isUpper case*/

if (isupper(passwordValidate[countValue]))

{

upperCase++;

}

/*checks islowercase*/

else if (islower(passwordValidate[countValue]))

{

lowerCase++;

}

/*checks whether it is digit or not*/

else if (isdigit(passwordValidate[countValue]))

{

digitCompute++;

}

}

/*validates the upper case*/

if (upperCase == 0)

{

cout << "NO UPPERCASE CASE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

/*check the lower case*/

else if (lowerCase == 0)

{

cout << "NO LOWERCASE CASE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

/*checks whether it is a digit*/

else if (digitCompute == 0)

{

cout << "NO DIGITE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

Other Questions
An art shop has 80 large boxes of markers and 34 small boxes of markers in stock. Each large box contains 48 markers and each small box contains 20 markers.Which equation could be used to find n, the total number of markers in stock?A:80 48 + 34 20= nB:80 + 48 34 + 20 = nC:80483420=nD:80 + 48 + 34 + 20 = n A complaint about bureaucracies is the ________ often involved in dealing with them. is government spending better measured as a percentage of gdp or in nominal dollars With fewer managers and more people in positions without managerial accountability, which building block will you rely upon to ensure jobs are properly supervised?. Graph the solution to the equation y=1/4+2 and y=2x7 which of the following businesses would most likely have the longest operating cycle? multiple choice a chain of coffee shops a national sporting goods chain an antiques dealer a christmas tree farm Solve the simultaneous equations PLS HELP HIGH POINTSWhich term describes this reaction?~KIK-TKH3N+-C-CadditionOcondensationx eliminationO substitutionH-N-C-CHOHN-C-C-IN-C-CHHH PLEASE HELP WILL GIVE 20 POINTS, 5 STAR RATING, AND BRAINLIEST, PLEASE HELP ASAPPP!!!!!, if wrong will report and give a 0 rating on personal account. PLEASE HELPPPP!!!!! How does expected inflation occur? 1. When mountain climbers hike up Mount Everest, they carry bottles of oxygen because the pressure decreases. At the top, the pressure can reach as low as 0.20 atm. If they bring 15 L of oxygen, stored at a pressure of 40 atm, what will be the volume of the gas when it is released at the top of the mountain? Assume that the temperature does not change as you climb the mountain. What personal traits aid Rainsfords survival? (explain with citing of the text using the START strategy - START being S-source T-title A-author R- right verb T-topic) What is the slope of a line parallel to the line whose equation is x + y = 6 consider a steam power plant operation on the simple ideal rankine cycle. the steam enters the turbine at 3 mpa and 350 oc and is condensed in the condenser at a pressure of 75 kpa. determine the thermal efficiency of this cycle. Budgeting Quick CheckDefine autonomous consumption (1 point)Autonomous consumption is the amount that a person must spend on basic needs (such as food andhousing) regardless of his or her income.Autonomous consumption is the amount that a person chooses to spend over the costs of his or her basicneeds, such as food and housingAutonomous consumption is the amount that a person spends on himself or herself and does not include anyshared expenses, such as the cost of housing if other people also live in the dwellingAutonomous consumption is the amount that a person spends on other people and does not include anyexpenses that are spent solely for oneself, such as food or luxury items whats meaning abt "bangsat" In "i have a dream," dr. King tells his listeners that they should not "wallow in the valley of despair. " what feeling is he urging them to avoid?. cloud kicks wants to track shoe designs by products. shoe designs should be unable to be deleted, and there can be multiple designs for one product across various stages. which two steps should the administrator configure to meet this requirement? Consider a box resting on a horizontal surface. The box has a mass of 2.13 kg and the coefficient of static friction between the box and the surface is 0.151. Determine the force that must be applied down at a 37.8 angle to the horizontal to make the box start moving. Match each stage of translation with the key events that occur during that stagea. Initiationb. Elongationc. Termination1. Peptide bonds are formed between amino acids to synthesize a polypeptide2. mRNA, tRNA, and ribosomal subunits are assembled3. A release factor bind to the A site of the ribosome