Answer:
What's the question?
Explanation:
Answer:
A) intellectual property, core competencies, and financial and human assets
Explanation:
Key corporate assets are
Intellectual property
Core competencies
Financial and human assets.
Corporate assets are referred to as individuals, properties, goods, data company or firm repute.These assets are managed digitally. A digital firm is the one in which almost all the important business partnerships and relationships that an organization has with their employees, customers are administered, interposed and handles digitally.
Intellectual property:
It is a property that is the outcome of human creativity and intelligence. It is an intangible property such as copyrights, patents, trademarks etc. The IP strategy is basically a strategy, in accordance with the company's business objectives, to obtain IP assets and extract the most benefit from current IP assets.
Core Competencies:
Core competencies are the skills and proficiency that are essential for a company or business to attain competitive edge. They separate an organization from its competitors and create a competitive lead for a it in the marketplace. Core competency is an corporation's tactical and strategic strength. Development of core competencies of an corporation helps to sustain the competitive advantage of the corporation for a long time.
Financial and human assets.
Basically, the individuals in a corporate determine and define a corporate's success or failure. Human assets are a part of the company's intangible assets. For example human capital is an intangible asset. It can be defined as economic benefit of a worker's experience and skills. For example assets like knowledge, training, intellect, expertise, health. The abilities of employees reflects corporate's assets.
Financial assets refer to a security contract that contains a right over the real assets of a company. For example cash, stocks, bonds and bank deposits. A financial asset has a claim on the real assets or physical assets usually possessed by a company. Financial assets 'main contribution is to finance companies or money making organizations. These are provided in the market so that investors can bring their investments to use, and corporations can invest in real assets and make money.
Answer:
#include <iostream>
#include <iomanip>
using namespace std;
int main()
{
double side, height;
cout<<"Enter the length of one of the sides of the base: ";
cin>>side;
cout<<"Enter the height: ";
cin>>height;
double area = side * side;
double volume = area * height / 3;
cout<<"The area of the base of the pyramid is: "<<area<<endl;
cout<<"The height of the pyramid is: "<<height<<endl;
cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;
return 0;
}
Pseudocode:
Declare side, height
Get side
Get height
Set area = side * side
Set volume = area * height / 3
Print area
Print height
Print volume
Explanation:
Include <iomanip> to have two decimal places
Declare the side and height
Ask the user to enter side and height
Calculate the base area, multiply side by side
Calculate the volume using the given formula
Print area, height and volume (use fixed and setprecision(2) to have two decimal places)
Answer:
End to End Delay = 64 micro second
Explanation:
Given
Bandwidth = 125Mbps
A packet = 1000 bytes
Converting bandwidth from Mbps to bit/s
Bandwidth = 125* 10^6 bits/s
Bandwidth = 125,000,000 bit/s
End to End delay is calculated as
Length of Packet ÷ Bandwidth
Length of Packet = 1,000 byte --- convert to bits
Length of Packet = 1000 * 8
Length of Packet = 8,000 bits
So, End to End delay = 8,000/125,000,000
End to End Delay = 0.0000064 seconds --- convert to micro second
End to End Delay = 64 micro second
Answer:
192.168.228.0 255.255.255.224
Explanation:
192.168.228.0 255.255.255.128
subnet mask: defines the host and the network part of a ip
CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip
For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25
To have atleast 20 hosts
20 ≤ (2^x) -2
x ≈5
with 5 host bits, we have 2^5-2 = 30 hosts per subnet
and 2^3 = 8 subnets
To get the subnet mask, we have 3 network bits
1110000 to base 10 = 2^7 + 2^6 +2^5= 224
192.168.228.0 255.255.255.224
b. It allows an administrator to analyze a computer and compare its configuration settings with a baseline.
c. It can apply a baseline to force current computer settings to match the settings defined in the baseline.
d. It uses security templates to store the settings that make up baselines.
Answer: a. It evaluates the current security state of computers in accordance with Microsoft security recommendations
Explanation:
The Security Configuration and Analysis tool allows the configuration of local computers through the application of the settings in a security template to the local policy.
This allows an administrator to analyze a computer and compare its configuration settings with a baseline. The Security Configuration and Analysis (SCA) tool also uses security templates to store the settings that make up baselines.
Therefore, based on the options given, the correct option is A as the SCA tool doesn't evaluate the current security state of computers in accordance with Microsoft security recommendations.
ii. How do the first three security concepts relate to these four attacks
Answer and Explanation:
I and II answered
Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.
Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.
Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.
Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.