______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Answers

Answer 1

SOX requirements requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Sarbanes Oxley (SOX) requires that data security policies are being made, effectively communicated and enforced. This is needed for data security as well as protecting financial data needed for normal operations.

SOX requirements are needed to be met so as to perform compliance auditing.

Find out more at: https://brainly.com/question/17157670


Related Questions

What is the difference between the dom api and the html dom api.

Answers

The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

How to combine multiple documents into one pdf.

Answers

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

What is the main purpose of adding captions to an image or table in Word?
O to show the reader where to learn more about the image
O to identify other images that are similar to the one shown
O to add detailed information about the image for the reader
O to provide information on the size and shape of the image

Answers

Answer:

C. to add detailed information about the image for the reader

Explanation:

hope this helps :)

The main purpose of adding captions to an image or table in Word is to provide detailed information about the image for the reader.

Thus, option (c) is correct.

Captions help the reader understand the content of the image, such as its context, significance, or key points, without having to rely solely on the visual information.

Captions also help in referencing the image or table in the text, making it easier for readers to locate and understand the content being discussed in the document.

Therefore, adding captions provide detailed information about the image for the reader.

Thus, option (c) is correct.

Learn more about caption here:

https://brainly.com/question/10413551

#SPJ3

Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.

Answers

Jim is the main antagonist while Edward is the main protagonist of the movie.

The ____ design is the process of selecting the data storage and data access characteristics of the database.

Answers

Answer:

The Physical database design is the process of selecting the data storage and data access characteristics of the database.

does anyone know how to make a astronaut hop while using loop?

Answers

Answer:

In Java

Explanation:

package application;

import java.util.Scanner;

import entities.Astronaut;

public class Main {

public static void main(String[] args) {

 Scanner sc = new Scanner(System.in);

 

 System.out.print("How is the astronaut's energy in a scale of 0 to 100? ");

 int energy = sc.nextInt();

 

 Astronaut fakeArmstrong = new Astronaut();

 

 while (energy > 0) {

  fakeArmstrong.hop();

  energy--;

 }

 

 System.out.println("The astronaut is tired eh? Let him rest you psychopato");

 sc.close();

}

}

----------------------------------------------------------------------------------------------

package entities;

public class Astronaut {

private int bodyEnergy;

 

public Astronaut() {

 

}

 

 

public int getBodyEnergy() {

 return bodyEnergy;

}

public void hop() {  

 System.out.println("up and down!");    

}

}

Since the advent of online writing, our audience:

A. has grown much larger

B. rarely reads what we write

C. has become disinterested

D. usually comprises one person​

Answers

Answer:

C............. I think

Since the advent of online writing, our audience: A. has grown much larger.

Writing refers to an act (process) of using alphabets and writing symbols to communicate ideas, emotions, and thoughts in a readable form.

On a related note, online writing can be defined as a process that involves writing and making a literary work (piece) solely available for an audience over the internet.

Generally, the audience for online writing has grown much larger, as a result of technological advancement and the availability of communication devices such as:

SmartphonesLaptopsPalmtopse-diaries

In conclusion, our audience has grown much larger since the advent of online writing.

Read more on online writing here: https://brainly.com/question/10354868

Who are the primary users of erp systems?.

Answers

Explanation:

resellers, partners, suppliers, and distributors.

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

The network or networks within an AS communicate with protocols as well; these are called generically __________.

Answers

The protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called: interior gateway protocol (IGP).

A network refer to a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together, especially for the purpose of exchanging (transmitting) data electronically.

An autonomous system (AS) can be defined as a network or group of networks that are administered or managed by an individual or business firm while using a single set of management rules.

Generally, an autonomous system (AS) typically uses a single (one) Internet Protocol (IP) routing protocol.

In this context, the protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called an interior gateway protocol (IGP).

On the other hand, an exterior gateway protocol (EGP) is the protocol that is used by autonomous systems (AS) to communicate with each other.

Read more: https://brainly.com/question/20629962

tax preparation software can help prepare and file your taxes by _________.

Answers

tax preparation software can help prepare and file your taxes by April 15.

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Answers

Answer:

Secrecy

Explanation:

Options:

A) Necessity.

B) Secrecy.

C) Integrity.

D) Encryption.

B) Secrecy Is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

The FAT method ______________.

a. keeps information about the block where bit vector is stored.

b. employs space maps to manage information about free blocks.

c. does not store information about free blocks.

d. incorporates free-block accounting into the allocation data structure.

Answers

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

https://brainly.com/question/4671431

Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built

Answers

Answer:

Iterative

Explanation:

is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.

Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do

Answers

Answer:

bobo

Explanation:

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

Why is remixing so popular with artists and other people online?

A.
It is so popular because remixes are guaranteed to make money.

B.
It requires no skill or special tools to do.

C.
It is a legal loophole that allows them to benefit from other people’s work.

D.
It is a way to be creative without having to construct totally new pieces.

Answers

Answer:

D.It is a way to be creative without having to construct totally new pieces.

Explanation:The answer is -D- because it is true. Remixing is a way of being creative, and you don't have to make completely new pieces.

Answer:

its likely D

Explanation:

remixing allows artists to combine and change different songs without having to actually create a song their-selves

where on a computer is the operating system generally stored?

Answers

The operating system on a computer is generally stored at hard disk.

Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.

An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.

The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.

Learn more about Interrupt here:

brainly.com/question/29770273

#SPJ6

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Fill in the blank
please help.

_______________________ _____________________ software allows you to prepare documents such as _______________________ and _______________________. It allows you to _______________________, _______________________ and format these documents. You can also _______________________ the documents and retrieved it at a later date.

Answers

Answer:

Application software allows you to prepare documents such as text and graphics. It allows you to manipulate data , manage information and format these documents. You can also store the documents and retrieve it at a later date.

Do you think should give credit to people who invented viral dances?

Answers

Answer:

michal jackson i think who credit to people invented viral dances.

Answer:

Yes

Explanation:

Well, they added some taste to life.

Animals living in burrows under the ground is an interaction between the biosphere and the

Answers

Answer:

Geosphere

Explanation:

The geosphere is made up of the rocks and minerals of the earth found in the ground.

if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use

Answers

The Smart glove is known to be a very common hardware. The sensor that an individual can use, is the Inertial Measurement Unit (IMU) sensors.

Inertial Measurement Unit (IMU) sensors is a type of sensor that capture alltogether the motion of hand and wrist movements.

It is known to contain some bending sensors that is used to detect bending in one direction or another.

All the sensors are often linked to a computer system that put together the amount of individual finger movement of the patient.

Learn more from

https://brainly.com/question/20591341

You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create

Answers

Based on the information given, the type of file that the user should create is the batch file.

Batch file simply means a script file in Microsoft Windows. A batch file consists of a series of commands that will be executed by the command-line interpreter.

Since the user has been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client, the batch file will be vital in this case.

Read related link on:

https://brainly.com/question/25520771

Distributions of links in most networks follow a(n) __________ rule. radio_button_unchecked 60/40 radio_button_unchecked 90/10 radio_button_unchecked 50/50 radio_button_unchecked 80/20 SUBMIT

Answers

In most computer networks, the distribution of links follow an: 80/20 rule.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

An 80/20 rule is also referred to as the Pareto Principle and it can be defined as a concept in cybersecurity, which states that there exist an unequal relationship between outputs and inputs, in the ratio of 80 percent to 20 percent respectively.

In most computer networks, the distribution of links follow an 80/20 rule by rationalizing the amount of traffic that must enter into a network (20 percent) with respect to the amount of traffic that must exit the network (80 percent).

Read more: https://brainly.com/question/22365112

The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on the directory only allow the user and group owners to view the contents of the directory. Users who are not part of the group owner are unable to list the contents of the directory.

As part of a new company policy to increase teamwork, you want to allow all users to be able to see the /sales directory and list its contents. You also want to let all users open, but not change, any document inside that directory.

Task:

Allow the other group to browse the /sales directory.

Modify permissions on all files in the /sales directory to allow members of the other group to view but not change the file.
Type:

chmod o+rx /sales

Answers

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

File permissions are often set or changed using “Change Mode.” o+ Add permission for “others” with – (remove) r (other possible options include u (user) and g (group)). Permission is read. Implement permission (other possible values include w – write permission)

What is main function of the chmod?

What permission—read (r), write (w), or execute—is third? (x). You would enter chmod o+rx [filename] to add world read and execute permission to a file using symbolic mode. You would type chmod o-r [filename] to make a file world read-only.

— rw-r—r— (644) — Group members and others can only read; only the user has read and write access. — rwx——— (700) — Reading, writing, and executing are all restricted to the user.

Therefore, RWXRXRX (755) — Only the user and the group and others can read and execute; the user has read, write, and execute permissions.

Learn more about chmod here:

https://brainly.com/question/14187643

#SPJ2

Other Questions
Help?Write the names of the reactants of photosynthesis below______,_______and_____ what are the greenhouse gasses in the earth that are primarily responsible for the greenhouse effect on Earth Supplements of the water-soluble vitamins ______ and _______ are most likely to cause toxicity symptoms. SOMEONE TELL ME WHAT THIS IS PLEASE ( much appreciated if you do help with this question ) y+7=2(x+5) in standard form 3. Do you believe it would be more challenging to be a historical archaeologist or a prehistoric archaeologist? Why? In "The Second Coming" by W.B. Yeats, the speaker asserts that the best people "lack all conviction," while the worst are "full of passionate intensity." How does this statement apply to the speakers in "An Irish Airman Foresees His Death" and "The Love Song of J. Alfred Prufrock"? What characteristics of the modern world make it difficult, if not impossible, to be heroic in the traditional sense? Help me to answer this please. if 2.4l of chlorine at 400 mm hg are compressed to 725 mm hg at a constant temperature. what is the new volume? The text states that Muhammad was a great religious, political, and military leader. What details in the text support this claim? What is the function of tendons? What amendment allowed women to vote. A candle is 14 inches tall. Once the candle is lit, it burns at a rate of 0.8 inches per hour. How many hours will the candle last? if something traveled 36 feet in 22 frames in a 60 fps video, how fast would that be in mph? Since graduating college, you have worked in the promotion department at the headquarters of a national hospital chain. Because of your excellent record, youve now been given a high-profile, challenging new job: manager of promotion for Mercy Health, an old city hospital extensively renovated and upgraded to compete with suburban health care institutions. It wont be easy, as your budget is tight. Moreover, youve learned that patient and revenue numbers at Mercy havent increased despite months of advertising its state-of-the-art acute care facilities as well as its innovative, award-winning Wellness Center.Right off the bat, you must make a fundamental and tricky choice: What is the correct promotion objective? Your past experience has been with brand-new hospitals, which clearly need promotion to build awareness that they exist. But this institution isnt new, so you could reasonably focus either on stimulating demand, or on encouraging trial.Demand stimulation might be appropriate if prospective patientsor referring physiciansarent clear about how Mercy Health stacks up against competition. You must think about the feedback from previous advertising: Did it succeed in differentiating your product?Encouraging trial would be the better choice if people know how Mercy compares to alternatives but must be nudged to act on that knowledge. Dr. Wills, your medical advisor, reminds you that this approach could be particularly effective with physicians who routinely refer patients to other hospitals and need some incentive to change their habits.Which objective should you choose?Encouraging trialORStimulating demand Which elements would HAVE a dipole interaction when bonding* inOcoNa-CIH-HK-Ca Ethan simply shrugs his shoulders when his mother asks him if he'll be home Saturday night to babysit his sister. This is an example of ___. Indeterminate sanctions include community service, restitution, fines, boot camp, home confinement and _________________ Solve.5.6x=4What is the solution to the equation?Enter your answer as a simplified fraction in the box. Which type of interaction is described below? ________ interactions occur between individuals of two or more different species.