You use encryption, user accounts, and access control lists (ACLs). However, you find that there is no plan to replace database server hardware if it fails. You find that ordering a replacement server would take at least 24 hours to arrive, and an additional 6 hours to prepare for use. Which part of the C-I-A security triad has failed?

Answers

Answer 1

Based on the scenario, the part of the C-I-A security triad that has failed is maintaining availability.

What is the C-I-A security triad?

The C-I-A security triad refers to an abbreviation for confidentiality, integrity and availability. It can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in an organization, so as to effectively and efficiently protect and make their data available to authorized end users.

In this scenario, the part of the C-I-A security triad that has failed is maintaining availability because the database server hardware cannot be replaced immediately if it fails.

Read more on data here: brainly.com/question/25558534


Related Questions

what are the five generation of computer hardware​

Answers

Answer:

First Generation: Vacuum Tubes.

Second Generation: Transistors.

Third Generation: Integrated Circuits.

Fourth Generation: Microprocessors.

Fifth Generation: Artificial Intelligence.

Select the correct option that shows a function in F# that receives a list of integers and returns the average value all its elements as a float.
a. let averageList list = List.fold (fun acc elem -> acc + elem) 0 list / float list.Length
b. let averageList list = List.map (fun (acc,elem) -> acc + float elem) 0 list / list.Length
c. let averageList list = List.map (fun acc elem -> acc + elem) 0 list / list.Length
d. let averageList list = List.filter (fun (acc,elem) -> acc + elem) 0.0 list / float list.Length
e. let averageList list = List.fold (fun acc elem -> acc + float elem) 0.0 list / float list.Length

Answers

Answer: acc

Explanation:

Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.

Answers

Database policies should be created and implemented by all organizations, regardless of the size of the organization.

What are database policies?

A database is a large collection of data that has been formatted to fit a certain standard. Database policies are law, enacted to protect usage of data by an individual, firms or governments.

The advantages of using a database would be that the information found there has been selected by experts in the field, while it also includes scholarly information that has been published or presented for review.

Hence, database policies should be created and implemented by all organizations, regardless of the size of the organization.

Learn more about database policies here: https://brainly.com/question/379106

BRAINLIEST AND 50 POINTS PLEASE AND FAST FAST FAST FAST FAST!!!!!!
What are three things that the use of color on a website do?

Answers

Answer: Colors can attract the attention of others, create the environment for a website, and it has an impact on how people feel about that website. When you dig into the psychology part of it, there is a variety of different things you can do with color on a website.

You use utility software to_____. Select all that apply.

A play video games
B reformat a hard disk drive
C manage fonts on a computer
D write and edit documents

Answers

Utility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates.

You use utility software to:

Reformat a hard disk drive.Manage fonts on a computer.

What are utility software used for?

Utility software are known to be a kind of software that is often used to  configure and maintain any system.

Conclusively, Note that this software is made up of  small programs which can be used to  Reformat a hard disk drive and also to Manage fonts on a computer.

Learn more about  utility software from

https://brainly.com/question/20659068

Whats is a better game?

Answers

Answer:

The first two are the best ones I see here, because I play them. Not sure how else to say that. Please make sure to also use brainly for school, though. Thanks!

How many times would the following loop iterate?
Set k = 1
While k < 5
Display k
Set k = k + 1
End While

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

The code is :

Set k = 1

While k < 5

Display k

Set k = k + 1

End While

this is a while loop, that will iterate 4 times and display the body of loop.  and at the fifth iteration, the loop condition does not meet the condition and the loop will get terminated.

Typing into a text _____
allows a user to place text on a slide without attaching the text to a visual object.

Answers

Answer:

box

Explanation:

What are programs that organize, analyze, and graph numeric data such as budgets and financial reports.

Answers

Spreadsheets organize, analyze, and graph numeric data such as budgets and financial reports. They are widely used by nearly every profession. Microsoft Excel is the most widely used spreadsheet program.

how do artificial intelligence works?

Answers

Computers and Technology

[tex]\huge\purple{——————————}[/tex]

[tex] \large \bold{QUESTION:}[/tex]

How do artificial intelligence works?

[tex] \\ [/tex]

[tex] \large \bold{ANSWER:}[/tex]

To imitate human intelligence, artificial intelligence employs machine learning. Because the computer must learn how to react to certain activities, it creates a propensity model using algorithms and previous data. Following that, propensity models will begin to make predictions.

[tex]\huge\purple{——————————}[/tex]

#CarryOnLearning

Find 10 real world challenges and their corresponding solutions

Answers

Answer:

Climate Change - Save energy at home, Walk, cycle or take public transport

Health Care - Focus on Patient Engagement.

Violence - Take all violence and abuse seriously.

Homelessness - A Coordinated Approach. To end homelessness, a community-wide coordinated approach to delivering services, housing, and programs is needed

Food Insecurity - Reduce Food Waste

Education Problem - Adoption of technology. Effective use of technological tools in teaching has many benefits.

Pollution- Reduce the number of trips you take in your car and reduce or eliminate fireplace and wood stove use.

Unemployment - Change in industrial technique.

Government Corruption - expose corrupt activities and risks that may otherwise remain hidden.

Malnourishment & Hunger - Food Donations, transitioning, and urban Farming

Explanation:

Python programmers use the Else statement to run code
O when all the conditions in the preceding If and Elif statements evaluate as False.
when the first condition evaluates as True and the second condition evaluates as False.
when the code needs to be executed every time the program is run.
when the code needs to be executed for conditions that evaluate as True.

Answers

An else statement runs when all the conditions in the preceding if and elif statements evaluate as False.

Python programmers use the Else statement to run code when all the conditions in the preceding If and Elif statements evaluate as False.

What is an else statement in Python?

An else statement is known to be a kind of computer statement that is made up of  block of code that are often used to carry out the if conditional expression in the if statement so as to be able to take it to 0 or a FALSE value.

Conclusively, note that the else statement is said to be a statement that is optional in nature and as such, Python programmers use the Else statement to run code when all the conditions in the preceding If and Elif statements evaluate as False.

Learn more about Python programmers  from

https://brainly.com/question/13723557

#SPJ2

Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.045) / 12.

Ex: If the input is 200000 210000, the output is:

This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $750.0.

Answers

Answer:

here is the answer

Explanation:

current_price = int(input("Enter the current price: "))

last_months_price = int(input("Enter the last month's price: "))

print("Current price is: " + str(current_price) + ", Last month's price was: " + str(last_months_price))

print("The change since last month is: " + str(current_price - last_months_price))

print("The estimated monthly mortgage is: " + str(current_price * 0.051))

Get the inputs for the current price and last month's price

Print the prices

Calculate and print the change, current_price - last_months_price, since last month

Calculate, using given formula, and print the estimated monthly mortgage

Enter("Enter the current price: ") current price = int, enter("Enter the last month's price: ") last months price = int.

What is Program?

The price last month was: " + str(last months price) and the current price is: " + str(current price) + ".

print("The difference from the previous month is: " + str(current price - last months price)). print("The approximate mortgage payment is: " + str(current price * 0.051))

Obtain the inputs for the price today and the price last month.

Therefore, Enter("Enter the current price: ") current price = int, enter("Enter the last month's price: ") last months price = int.

To learn more about program, refer to the link:

https://brainly.com/question/3224396

#SPJ2

Plzzzzzzz help good answers only and best answer gets brainly

Answers

Answer:

Desmos (colab w/h math antics) , Calendar, Quizlet (colab w/h google) , Quizizz (colab w/h quizlet) , Kahoot (colab w/h google) , or Google Translate

Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is in the same folder as your executing program. Access the requested position within the file, and display the next 10 characters there.

Answers

The program is an illustration of file manipulations, where files are accessed, read and modified

The main program

The program written in Python, where comments are used to explain each action is as follows;

#This gets the file name

fname = input("Enter file name: ")

#This gets an integer value

num = int(input("Integer: "))

#This opens the file

file = open(fname, 'r')

#This initializes the number of characters to 0

count = 0

#This begins an iteration

while 1:

# This prints each character

print(file.read(1))

#This increases the number of characters printed by 1

count+=1

#When 10 characters are printed

if count == 10:

    #This closes the iteration

 break

#This closes the file

file.close()

Read more about file manipulations at:

https://brainly.com/question/16397886

Why is computer called diligent machine? ​

Answers

Computer is called diligent machine because it can perform the task repeatedly without loosing its speed and accuracy for a long time.

[tex]\huge\bold\green{Answer:-}[/tex]

Diligence: - It is a characteristic of computer. Computers can work for many hours continuously without taking any rest and without decreasing its speed, accuracy and efficiency. It is free from tiredness,lack of concentration, fatigue etc.2)Versatile: -Computer is a versatile machine which can do varieties of task such as simple calculation to a complex and logical operation. It is used in various fields for various purposes.

Computer are persistent and power to do work for hours without tiredness and fatigue with same level of accuracy. That is why Computers are called diligent.

ʜᴏᴘᴇ ɪᴛ ʜᴇʟᴘꜱ❤

Which mynav module serves as the source for sales and delivery content, assets, and internet and intellectual property across industries?

Answers

Accenture's myNav is the mynav module serves as the source for sales and delivery content, assets, and internet and intellectual property across industries.

What are myNav modules?

myNav is a tool that is used by companies so as to manage the human, technology and also some other dimensions of cloud services in business.

The Accenture's myNav is known to be the right tool for the above platform as it on that can help the firm and the people to choose end-to-end cloud solutions.

Learn more about  Accenture from

https://brainly.com/question/24918185

Which statement best describes which options should be used when printing envelopes?
A.)the address should always be filled out and the return address and postage will demand on the situation.
B.) The address and return address should always be filled out in the postage will depend on the situation.
C.) The return address should always be filled out in the address and postage will depend on the situation.
D.) The postage should always be selected in the return address and address will depend on the situation.

Answers

A or D I’m not too sure tbh but good luck

Answer:

B

Explanation:

Describe the big data life cycle

Answers

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

Explanation:

mark me as brainliest please

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

Explanation:

In order to share resources, Windows devices must be part of

Answers

In order to share resources, Windows devices must be part of a workgroup called WORKGROUP.

Are resources shared in a network?

In computing, we often shared resource, or network. This is known to be when a computer resource is said to be made available to people from one host to other hosts and this is usually done on a computer network.

Note that Advanced Sharing is said to be a way of sharing resources in Windows as it helps one to have a detailed customization of the way one what to do the sharing.

Learn more about  Windows devices from

https://brainly.com/question/26420125

_______________involves engineers building up a 3D geometry piece by piece.

2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer’s intent.

Answers

Answer:

Parametric design involves engineers building up a 3D geometry piece by piece. 2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer's intent.

Explanation:

Hope this helps

PLEASE HURRY!!!!

What will be the output of the following program? Assume the user responds with a 2.

answer = input ("How many books would you like? ")
priceBook = 3.20
intNumberBooks = float(answer)
moneyDue = intNumberBooks * priceBook
print ("You owe $", moneyDue)

A) You owe $ 6.40
B) An error occurs.
C) You owe $6.40
D) You owe $moneyDue

Answers

Answer:

A or C (depends on your programming language)

Explanation:

When someone replies to the input, "answer" is set to a string containing their reply -- in this case, 2. intNumberBooks is set to the floating-point value of "answer" (which is actually strange, since "int" implies an integer). So if the user responds with 2, intNumberBooks = 2. moneyDue then is set to the price times the number of books:

moneyDue = 2 * 3.20

So it will print moneyDue of $6.40. Whether the answer is A or C, though, depends on the programming language you're using -- I can't tell whether it will print a space after the $ or not, unfortunately.

The output of the given program if assuming the user responds with a 2 is You owe $6.40. The correct option is A.

What is the output?

Data input is required for programs. The program uses (processes) this data, and as a result, data (or information) is output. Any information that a program or other electronic device processes and sends out is considered its output. The output is anything that can be seen on the computer screen, such as the words you type on the keyboard.

When someone responds to an input, the floating-point value of "answer" in number books is set to a string expressing their response, in this case, 2.

Therefore, if the user replies with 2, the money owing is set to the price multiplied by the number of books:

Money Due = 2 x 3.20 = $6.40

Therefore, the correct option is A. You owe $ 6.40.

To learn more about output, refer to the below link:

https://brainly.com/question/28903099

#SPJ5

okay this is a odd question but what is this symbol called?
< > what are these called lol

Answers

Answer: greater then or less than lol

Explanation: I learned it in elementary-

Explanation:

the one that "eats" the number means that one is greater.

greater than and less than.

hope this helps !

what is Google search​

Answers

Answer:

a web search engine developed by Google LLC.

Explanation:

Answer:

Google Search, or simply Google, is a web search engine developed by Google LLC.The main purpose of Google Search is to search for text in publicly accessible documents offered by web servers, as opposed to other data, such as images or data contained in databases.Google has a large index of keywords that help determine search results. What sets Google apart is how it ranks its results, which determines the order Google displays results on its search engine results pages. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation:

Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all files that had been added or changed that day were lost. A new disk had to be purchased for overnight delivery, and the data had to be restored. Several days of work were lost. The owner of CSM Tech wants to know what can be done to prevent the loss of data and time if a disk crashes in the future. The server currently has two disks installed: one for the Windows boot and system volumes and one for manuscript files. The disk used for manuscript files is about one-third full. There’s enough money in the budget to purchase up to two new drives if needed. a. What solution do you recommend, and why?

Answers

Answer:

They should go for cloud based model

Explanation:

Cloud based model should be sort after because with such a model there can be a restoration of contents in just a little period of time. As for the usage, payments can be done. They would have highly packed response time, turn around time and also provide information security. At a go, there is flexibility in terms of storage and information retrieval. This may be more costly though but it would be helpful for data recovery without requiring physical data transmission

5.16 *zyLab: Hello IDE The goal of this problem is learn how to use Eclipse or IntelliJ. Submit the source code files (.java) below. Make sure your source files are encoded in UTF-8. Some strange compiler errors are due to the text encoding not being correct. Complete the following: In your chosen IDE, create a new project. You can name the project anything you like, we recommend "M5". Create a new class file, titled HelloIDE (which will create the file HelloIDE.java). Write a main method in this class that prompts a user for their name, and then replies with "Hello, ___!" filling in the blank with the typed in name, trimmed. Otherwise, if the string is empty, or just contains only whitespace, or if no input is given, output "Hello, stranger!". Example input/output for input "Mark":

Answers

Answer:

import java.util.Scanner;

public class HelloIDE

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 name = name.trim();

 

 if(name.equals(""))

     name = "stranger";

     

 System.out.println("Hello, " + name + "!");

}

}

Explanation:

import the Scanner class to be able to get input from the user

Create an object of the Scanner class called input

Ask the user to enter the name and set it to the name

Trim the name using trim() method, removes the whitespaces from the string

Check the name. If name is equal to "", set the name as stranger. This way if the name is empty, or just contains whitespaces or if name is not given, name will be set as stranger.

Print the name in required format

write a program that accepts three decimal numbers as input and outputs their sums?​

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

The code is written in C++ language:

// Example program

#include <iostream>

#include <string>

using namespace std;

int main()

{

 double number [3];

 double addition=0;

 for (int i=0;i<3;i++)

 {

     cout<<"Enter decimal number at position " <<i+1< " ";

     cin>>number[i];

     addition= addition+ number[i];

           

     }

 cout<<"The addition is "<<addition;

}

Write a complete Java program that: Prompts an employee to enter the number of hours that they have worked in a given week and stores their response in a variable named hoursWork - Only whole hours are tallied, no partial hours Prompts the employee to enter their hourly wage in dollars and stores their response in a variable named payRate Computes the employee's weekly pay check under the following rules: All hours up to and including 40, are paid at exactly the employee's hourly wage - regular pay Any / All remaining hours, are paid at one and one half times the employee's hourly wage - overtime pay Displays to the screen a brief report including: The value of all of each of the user's inputs The amount of regular pay earned The amount of overtime pay earned You can find two separate sample runs of such a program in the unnamed box below the editor window.

Answers

Answer:

The solution is given in the explanation section

See comments for detailed explanation of each step

Explanation:

import java.util.Scanner;

public class QuestionOne{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       //Prompt User for input

       System.out.println("Enter Number of Hours worked this week");

       //Receive the value for number of hours

       int hoursWork = in.nextInt();

       //Prompt user for hourly wage rate

       System.out.println("Enter your hourly rate");

       double payRate = in.nextDouble();

       //compute pay

       double regularPay =0;

       //Calculate pay When there is no overtime

       if(hoursWork <= 40){

          regularPay = hoursWork*payRate;

           System.out.println("You worked for a total of "+ hoursWork+" at "+payRate

                   +" per hour, Your total pay is "+ regularPay);

       }

       // Calculate overtime pay

       //Obtain overtime by subtracting 40 from the total hours

       else{

           int extraHours = hoursWork-40;

           double overTimePay = extraHours*(1.5*payRate);

           regularPay = 40*payRate;

           System.out.println("You worked for "+hoursWork+" your regular pay is "+ regularPay+

                   " and your overtime pay is "+overTimePay);

       }

   }

}

What is the key difference between UDP and TCP protocols in TCP/IP reference model?

Answers

Answer:

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. The speed for TCP is slower while the speed of UDP is faster.

Answer:

TCP is a connection oriented protocol.

UDP is a connectionless protocol.

Explanation:

PLEASE MARK ME AS BRAINLIEST

HAVE A NICE DAY :)

How can you get to the Excel Function Reference information? Check all that apply.

Answers

Answer:

Click the cell in which you want to enter the formula.

In the formula bar. , type = (equal sign).

Do one of the following, select the cell that contains the value you want or type its cell reference. ...

Press Enter.

Explanation:

Answer:

Help tab

F1

searching in the tell me bar

Other Questions
Where do I put the comma with that in mind she remarked Ill just stay home. Complete the sentences. Use the simple past form of the verb La clase es 2 adjectivos, el/la profesor(a) es. ( 2 adjjetivos) Matthew Whitaker is a world-famous jazz pianist and musical prodigy. He's also blind. What do you think? Explain your reasoning.Please help me. Quickly! what are Three reasons why Americans pushed for overseas expansion?Global Competition for MarketsTo build strong cities (Urbanization)Expand Navy/New Navy portsCultural SuperiorityTo strengthen our government The figure below has a perimeter of 20 cm. Jinaiya wants to scale this figure by a factor of 0.75What will the perimeter of the scaled figure be? 7 1/6 - 62/5 = ?O A. 45O B. 145O C. 1/5O D. 1335 Read this sentence from paragraph 3. This means that knowledgeable experts can post information about a variety of subjectsand so can people who are not knowledgeable experts. What does the author try to explain in this sentence? A It is hard to determine who is an expert on the internet. B The internet includes false information. C There are not many experts on the internet. D The internet contains too much information in general. answer fast for brainliest!!! What key words would tell you it's a two step problem? (SELECT ALL)Question 2 options:Total BillAmount of SavingsSale PriceFinal CostPrice with TaxDiscountCommission What happens to temperature as a substance melts and heat energy is used to break the connections between molecules, until all melting is complete?. 12.) Latitude and longitude coordinates are used to determineA. An exact location on Earth without the use of landmarks or addressesB. The depth of the water at that pointC. The distance from one point to anotherD. The temperature and climate of an ecosystem13.) The deepest place in the ocean is found in the Pacific Ocean and is called what?A Great Pacific ReefB. Marianas TrenchC.Japan TrenchD. Abyssal Plain From paragraph 1, write down the sentence that describes Andersons surprising response to Colonel Andersons previous actions. In the years leading up to world war 11, how were germnay and japans goal similar Evelyn decides to open a business selling her one-of-a-kind cupcakes. Evelyn will be the sole owner of the business, although she will have a few employees. Evelyn plans to operate the business under the name "Cupcake Dreams." To legally operate her business, Evelyn will need to: ___________a. register her business name. b. file an operating agreement. c. file a certificate of organization which three social classes developed in sumerian city states? Which step in a comparative is not included in a descriptive investigation? How did American farming change between the "golden age" of farming immediately following World War I and the eve of the Great Depression? Why do you think stop and start codon signals are necessary tom protein synthesis? Jillian was asked to translate the expression 9 n into words. She wrote "a number increased by nine. " Which best describes the accuracy of Jillians answer? It is incorrect. The variable would come first in the expression "a number" (n) "increased by" ( ) "nine" (9). It is incorrect. The phrase "increased by" refers to the inequality symbol "greater than" (>), not addition. It is correct. A number increased by nine (n 9) is the same as nine increased by a number (9 n). It is incorrect. A number increased by nine refers to a multiplication expression (n times 9). Why is natural selection not considered a random event?