answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86
26 days ago
10

Olivia needs to get permission to use a graph of data gathered by a trade association she plans to include the graph in a report

she is preparing as a handout for customers how should she find out who owns the copyright​
Computers and Technology
2 answers:
oksian1 [797]26 days ago
5 0

Answer:

She can simply check the copyright notice on the website where the graph is displayed.

Explanation:

Natasha_Volkova [897]26 days ago
3 0

She can locate the copyright notice on the webpage that features the graph.

Explanation: ~Apex~

You might be interested in
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
ivann1987 [930]

Response:

C. Utilizing public-key encryption for data transfer

Reasoning:

Only encryption offers a secure method for communication.

4 0
29 days ago
Read 2 more answers
Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
zubka84 [942]

Answer:

Explanation:

For this illustration, I'll provide a Python program step-by-step:

  • We define four variables regarding our zoo, including the zoo count and the average.
  • The average is calculated by summing the totals of owls and dividing by the number of zoos.
  • Finally, we display the value stored in avg_owls.

num_owls_zoo1 = 1

num_owls_zoo2 = 2

num_owls_zoo3 = 3

num_owls_zoo4 = 4

zoos = 4

avg_owls = 0.0

avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos

print('Average owls per zoo:', int(avg_owls))

6 0
16 days ago
What is a commonly publicized password sql injection string?
Rzqust [894]
The phrases "or 1=1" and "or ''=''" are typical examples used to manipulate an SQL WHERE clause into evaluating as true.

Consequently, if you type in <span>' or ''=' as your password, you can authenticate if the query would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
9 days ago
If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,
Rzqust [894]

Answer:

cache I guess

Explanation:

unsure or memory HDD or SSD

5 0
18 days ago
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
ivann1987 [930]

Answer and explanation:

Authentication:

Authentication is achieved by entering a user ID and password, utilizing social sign-ins, or employing biometric methods. It serves to confirm the identity of the user and allow them access.

Here’s how authentication functions:

Prompt the user to provide their credentials.

Transmit these credentials to the authentication server.

Verify the credentials.

Grant access to the user upon successful match.

External Website Security:

It is crucial to safeguard the website from hackers and unauthorized users to avert any security issues.

Implement firewalls.

Establish access controls.

Utilize MVC (Model View Controller) to create different views tailored for various user types.

Employ encryption techniques.

Utilize SSL certificates.

Employ security plugins.

Adopt strategies for backup and disaster recovery.

Engage a network monitoring team.

Internal Website Security:

Use authentication to verify user identities.

Utilize authorization to assign specific privileges and access to different users.

Conceal or encrypt sensitive web pages.

Implement IT policy frameworks.

Educate users about the website.

Remote Access Solution:

Remote access enhances security, cost-effectiveness, management simplicity, and availability.

This can be set up using RAS gateways (either single or multi-tenant):

Remote access options include VPN (Virtual Private Network), BGP (Border Gateway Protocol), and Hyper-V networks.

This access can be configured simply. It includes enabling users, managing their access, securing assets, using remote desktop protocols, and overseeing sessions including RemoteApp and both personal and pooled desktops.

Firewall and Basic Rules Recommendations:

Firewalls are essential for traffic management and securing external websites.

Establish rules to prevent SQL injection and XSS.

Permit only specific traffic types.

Apply access rules for IP security.

Implement defined IT policies.

Users can create custom rules.

Wireless Security:

In today's landscape, Wi-Fi is prevalent in organizations and protects the network from harmful and unauthorized access.

Wireless security can be enhanced through encryption, decryption, and processes for authentication and authorization.

VLAN Configuration:

VLANs are critical for filtering traffic and logically dividing the network.

VLANs can be configured for web interfaces, facilitating web filtering.

The configuration for VLANs in a web interface can be done as follows:

Switching => VLAN => Advanced => VLAN Membership

Switching => VLAN > Advanced => Port PVID Configuration.

For VLAN web filtering:

VLANs can be interconnected between routers, firewalls, or switches to filter web traffic traversing the network.

Laptop Security Configuration:

Security for laptops can be achieved using passwords, VPNs, and MAC address registration. Employing security tools on local machines is also advisable. Device-level authentication via local usernames and passwords is a beneficial approach.

Application Policy Recommendations:

Application policies encompass the use of cookies, social media integration, access control, notification generation, and adherence to other organizational and IT guidelines.

Security and Privacy Policy Recommendations:

This includes a catalogue of security methods necessary for managing traffic filtering, IP spoofing, user authentication, and other specific website policies.

Intrusion Detection or Prevention for Systems with Customer Data:

IPS operates behind firewalls and reviews incoming traffic against security policies, matching signatures and managing any incidents while generating logs and alerts. The goal of IDS is to detect harmful traffic ahead of it penetrating further into the network, providing necessary alerts and notifications to the monitoring team. Opting for anomaly-based detection and prevention systems is recommended.

6 0
1 month ago
Other questions:
  • Q) Select the two obstacles for data parsing
    5·2 answers
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    15·1 answer
  • Write a sequence of statements that create a file named "greeting" and write a single line consisting of "Hello, World!" to that
    5·1 answer
  • Write a function solution that returns an arbitrary integer which is greater than n.
    13·1 answer
  • for question 1-3, consider the following code what is output if the user types in 9? click all that apply A, B, C, D click all t
    13·1 answer
  • 1. Orthographic Drawings are used to express ideas that are more complicated. Explain the purpose of the different views and the
    7·1 answer
  • U.S. industries like steel, computers, and energy need to be protected from foreign competition to ensure which of the following
    6·2 answers
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    10·1 answer
  • What term best describes the grammatical rules for writing proper code? paths syntax hyperlinks declarations
    7·2 answers
  • Redo Programming Exercise 16 of Chapter 4 so that all the named constants are defined in a namespace royaltyRates. PLEASE DONT F
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!