A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system is known as __________.

Answers

Answer 1
Answer:

Answer:

SECURITY ANALYSTS

Explanation:

Security Analysts is a specialised security

administrator which is responsible for maintaining the security and integrity of data and performing system development life cycle activities in the development of a security system. The security analyst must have knowledge of every aspect of information security within the organisation and must analyze the security measures of the company and determine how effective they are.

The specialized security Administrator will be responsible for keeping data safe across the organization by monitoring, reporting, and addressing them and he must takes measures to protect a company's sensitive information.


Related Questions

Click ____ to move a stacked object to the top of the stack. Move to Top Bring to Front Slide to Top Move to Front
A computer’s BIOS is defined as the
Give two examples of desktop publishing software
Which of the following is a form of mediated communication?a. CBS Evening News b. Facebook c. NPR Broadcast d. Time Magazine
The most commonly used method to connect to a WAN is through the telephone system. To do so, what piece of equipment would you require?

The most recent subfield of the quantitative perspective is _____, which is reflected in management information systems designed to provide relevant information to managers in a timely and cost-efficient manner. a. operations research b. infrastructure development c. information technology d. systems thinking e. operations management

Answers

Answer:

The correct answer to the following question will be Option C (Information technology).

Explanation:

IT was the use of certain devices, connectivity, computing, and other virtual equipment, networks and procedures to produce, manage, preserve, protect and share all types of information.

  • It is usually used against individual or media technology in the form of operations.
  • That's the most current analytical perspective field of study that is embodied in information systems programs designed and provides administrators with necessary data consistently and cost-effectively.

So, Option C is the right answer.

Answer:

c. information technology

Explanation:

The most recent subfield of the quantitative perspective is information technology, which is reflected in management information systems designed to provide relevant information to managers in a timely and cost-efficient manner.

Which type of cipher works by rearranging the characters in a message?

Answers

Ciphers convert messages from plaintext to ciphertext.
Transposition cipher is the type of cipcher that works by rearranging the characters in a message. This cipcher uses algorithm to rearrange the letters of a plaintext message to form ciphertext.
Other type is the substitution cipher which uses algorithm to replace each character or bit of plaintext with a different character.

Which one of the following libraries are mainly designed for machine vision? 1. Torch 2. Caffe 3. Deeplearning4j 4. Theano

Answers

The kid is lusted by the woman’s big watermelons

Final answer:

Out of the listed libraries, Caffe is primarily designed for machine vision due to its speed and specific tools for image classification and convolutional models.

Explanation:

The library out of the ones you mentioned that is mainly designed for machine vision is Caffe. Advanced machine vision requires speedy computations and Caffe, being a deep learning library, provides this speed. It's developed by the Berkeley Vision and Learning Center (BVLC) and is specifically geared towards image classification and convolutional models, which are key components of machine vision.

While other libraries like Torch, Theano, and Deeplearning4j also offer solutions for machine learning and deep learning computations, they are not as specialized as Caffe in handling tasks related specifically to machine vision.

Learn more about Machine Vision Libraries here:

brainly.com/question/35552364

#SPJ11

Determine the result. Type "Error" if the program would terminate due to divide-by-zero. Only literals appear in these expressions to focus attention on the operators; most practical expressions include variables.100 / 2

Answers

Answer:

It depends upon the programming language that you are working on, and you can set your own error message using the try catch option. As an example, suppose you are working on the C#. Code like below can be added:

using System;

class MainClass {

static void Main(string[] args) {

int a = 5;

int b= 0;

int c= 100/2;

console.WriteLine(c);

try {

int d = a / b;

} catch (DivideByZeroException err) {

Console.WriteLine(err);

}

}

}

System.DivideByZeroException: Attempted to divide by zero.

This will give the above error message. And this is an error message by the system. We can also have a user-defined error message.

Explanation:

Please check the answer.

The * key is used for _____.

Answers

The asterisk key or * key which is on above the number 8 on the computer keyboard is used to represent and perform the multiplication operations.

What is the use of * key?

Star key is represented with (*) symbol and used to perform the multiplication operations in a computer. The functions of this can be changed with different software.

The * key is generally known as the asterisk. It is found above the number 8 on a computer keyboard, and pressing the number 8 with shift is used to create this key.

Hence, the asterisk key or * key which is on above the number 8 on computer keyboard is used to represent and perform the multiplication operations.

Learn more about the keyboard key here:

brainly.com/question/14376228

#SPJ1

Answer:

Explanation:

it is B: multiplication

I am 100% sure it is correct

Ports on the motherboard can be disabled or enabled in ____ setup. RAM Firmware Northbridge BIOS

Answers

CMOS setup .........................................