Based on the Module 1 content, answer the questions below relating to calculating loss. When answering the questions, please keep in mind the following definitions and formulas:
Single Loss Expectancy (SLE) refers to the loss of a single item. If I lose a mobile phone that is work $1000 while visiting a remote work site, my SLE is $1000.
SLE = ALE/ARO
Annualized Rate of Occurrence (ARO) is the likelihood of a risk occurring within a year.
ARO = ALE/SLE
Annualized Loss Expectancy (ALE) refers to the total loss within a single year.
ALE = SLE x ARO
Scenario 2

A large international company has 3 data centers that are distributed globally (1 in the United States, 1 in Australia, and 1 in the United Kingdom). Each data center is valued at $1.2 Million and the company expects a natural disaster to destroy the United States data center once every 10 years. Answer the following questions based on this scenario:
3. What is the SLE?

4. What is the ALE?

5. The company is considering purchasing an insurance policy to cover the cost of the expected loss. They have received a quote for a policy that has a premium that costs $15,000/month. Should they purchase the policy (you must show your work to receive credit)?

Answers

Answer 1

The (Single Loss Expectancy) SLE of the company based on the above scenario is $120,000. See the explanation below.

What is the justification for the above result?

Recall that SLE = ALE/ARO

What is ALE?

ALE (Annualized Loss Expectancy)  = 1,200,000/10 years

= 120.000

ARO (Annualized Rate of Occurrence)  = 1

Hence SLE  = 120,000/1

SLE = 120,000.

Should they purchase the policy (you must show your work to receive credit)?

No, they should no buy the insurance policy.

Why?

At an annualized rate, the premium will be:

15,000 * 12

= $180,000

Recall from above that the ALE = 120,000

If the premium payable is higher than the ALE, then there is no rational justification for such an insurance cover.

Learn more about Single Loss Expectancy:

https://brainly.com/question/17088011

#SPJ1


Related Questions

4) a) List two hardware devices that are associated with the Data Link layer. b) Which is the most commonly used in modern Ethernet networks

Answers

Answer:

Bridges and switches

Explanation:

4a) A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the bridge and can forward packets accordingly.

A switch is an intelligent hub that examines the MAC address of arriving packets in order to determine which port to forward the packet to.

4b) Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet networks

A ______________ is responsible for transferring: Power, Data, Memory location and clock timing.

Answers

Answer:

Control Unit

Explanation:

Control unit is responsible for coordinating various operations using timing signals. The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to the instructions that have been sent to the processor.

Answer:

I am pretty sure its the cpu.

Explanation:

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

Bunco is a dice throwing game that requires no decisions to be made or skill on the part of the player just luck. In the simplest form of the game there are six rounds, progressing in order from one to six, where the number of the round serves as the target for that round's rolls. Within a round, players alternate turns rolling three dice aiming to obtain the target number. Players gain one point for each die matching the target. If the player gets three-of-a-kind of the target number (a Bunco), they get 21 points. Write a program to simulate two players playing a round of Bunco showing the dice throws and scores during the games as well as the final scores and the player with the highest score. Also indicate which winner won the most rounds

Answers

Abcdefghijklmnopqrstuvwxyz now I know my abcs, next time won’t you sing with me :)

How can we create different styles for the same type of element

Answers

To create different styles for the same type of element, you can utilize various techniques in web development and CSS (Cascading Style Sheets).

Here are a few approaches:

Class and ID Selectors: Assign different classes or IDs to the elements you want to style differently. Then, define separate styles for each class or ID in your CSS. For example, you can have multiple buttons with different styles by assigning different classes or IDs to them and applying specific CSS rules to each class or ID.Pseudo-classes and Pseudo-elements: Use pseudo-classes and pseudo-elements to target specific states or parts of an element. For instance, you can style different states of a button, such as hover or active, using pseudo-classes like :hover and :active.Inheritance: Leverage the cascading nature of CSS to apply styles from parent elements to their children. By defining styles on higher-level elements, you can create a consistent style for a group of elements while still allowing individual elements to have their own unique styles.Specificity: Adjust the specificity of your CSS selectors to control which styles take precedence. By carefully crafting selectors with varying levels of specificity, you can ensure that specific styles override others.External Stylesheets: Utilize different external CSS files for different styles. You can link different stylesheets to the same HTML document, allowing you to switch between styles by toggling the active stylesheet.These techniques provide flexibility and allow you to create diverse styles for the same type of element, enhancing the visual variety and customization options in your web development projects.

For more such questions on styles

https://brainly.com/question/15138259

#SPJ8

Local Area Networks (LANs)
1)only cover a short block
2)increase networking speed
3)take too long
4)are not used anymore

Local Area Networks (LANs)1)only cover a short block2)increase networking speed3)take too long4)are not

Answers

Answer:

increase networking speed

Explanation:

2020 edge

Answer:

increasing network speed

Explanation:

took the assignment on edge 2020 mark me as brainiest

to assign length and breadth to display area of a rectangle​

Answers

Answer:

In Python:

Length = float(input("Length: "))

Breadth = float(input("Breadth: "))

Area = Length * Breadth

Print(Area)

Explanation:

Get values for length and breadth

Length = float(input("Length: "))

Breadth = float(input("Breadth: "))

Calculate area

Area = Length * Breadth

Print area

Print(Area)

Select each of the strategies you can use to be more efficient when using the Internet. (MULTIPLE CHOICE)


- creating bookmarks or favorites

- setting your home page

- organizing bookmarks into folders

- navigating to other Web pages by clicking on links

- using tabs

- deleting bookmarks you are no longer using

- creating tables

Answers

Answer:
organizing bookmarks into folders creating bookmarks or favorites
Explanation:
not saying that I'm right or wrong but according to my research say you find a site that fits your interests and try to find that site later on using bookmarks could really help you making folders help separate things and the favorites to find sites you enjoyed and find them very easy like the bookmarks

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

what does the 4th industrial revolution mean?

Answers

Answer:

The Fourth Industrial Revolution is the current phase of technological advancements in the fields of automation, interconnectivity, artificial intelligence, and digitization. It builds on the third industrial revolution, which saw the introduction of computers and the automation of production processes. The Fourth Industrial Revolution includes technologies such as the Internet of Things (IoT), big data, cloud computing, robotics, and blockchain. These technologies are changing the way we live, work, and interact with each other, and they are transforming industries such as healthcare, manufacturing, transportation, and finance. The 4IR is seen as a major shift in the

Hope this helps.

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the name of the shop / office:.... Paste the computer based printed bill here:​

Answers

An example of a computer based printed bill is attached accordingly. The name of the business is national enterprise.

What is a computer based printed bill?

A digital invoice created by the provider in an accounting or financial software system is known as an e-bill (electronic bill). It is instantly provided to the payer in digital format through email or a web-based interface for electronic payment processing in their software system.

A billing machine is a machine created exclusively to produce client bills. It produces invoices and stores a copy in its database. There are several sorts of billing machines on the market, such as portable, automated, handheld devices, bus ticketing machines, and so on.

Learn more about Bills;
https://brainly.com/question/16405660
#SPJ1

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the

You are reviewing the IP address associated to an alert generated by Microsoft Defender for Endpoint.
You need to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.
Which section of the Microsoft 365 Defender portal can you use to identify the device?

Answers

The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory".

To identify the number of managed devices that successfully connected to the IP address during the previous 30 days, the device should be verified and traced. It is possible to determine the identity of the devices from which the alert was generated and to see their recent activity from the Microsoft 365 Defender portal.

The section of the Microsoft 365 Defender portal that can be used to identify the device is "Device inventory". Device inventory helps to understand the devices in your environment and any associated risk level.

Devices that are enrolled in a device management solution like Microsoft Intune or Configuration Manager, or that are running Windows 10 and later, can be viewed with the Microsoft 365 Defender portal. This helps to locate the assets that are most important to the organization and track their compliance.

The Device inventory section helps to track information such as device health, policies and configurations, vulnerability assessment results, and compliance level. This will help to know if the managed devices that are being monitored are meeting the compliance and security requirements of the organization.

In conclusion, the Device inventory section of the Microsoft 365 Defender portal can be used to identify the number of managed devices that successfully connected to the IP address during the previous 30 days.

For more such questions on Microsoft 365, click on:

https://brainly.com/question/30612299

#SPJ8

You are hired to create a simple Dictionary application. Your dictionary can take a search key from users then returns value(s) associated with the key. - Please explain how you would implement your dictionary. - Please state clearly which data structure(s) you will use and explain your decision. - Please explain how you communicate between the data structures and between a data structure and an interface.

Answers

Answer:

The application should have a form user interface to submit input, the input is used to query a database, if the input matches a row in the database, the value is displayed in the application.

Explanation:

The data structure in the database for the dictionary application should be a dictionary, with the input from the user as the key and the returned data as the value of the dictionary.

The dictionary application should have a user interface form that submits a query to the database and dictionary data structure returns its value to the application to the user screen.

Implement above using c programming language

Answers

Answer:

1. Click on the Start button

2. Select Run

3. Type cmd and press Enter

4. Type cd c:\TC\bin in the command prompt and press Enter

5. Type TC press Enter

6. Click on File -> New in C Editor window

7. Type the program

8. Save it as FileName.c (Use shortcut key F2 to save)

Which Word 2016 views are located on the Ribbon and the status bar? Choose three answers.

Which Word 2016 views are located on the Ribbon and the status bar? Choose three answers.

Answers

Answer:

I. Print layout.

II. Read mode.

III. Web layout.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word, the users are availed with the ability to view the word document in the following modes;

a. Print layout.

b. Web layout.

c. Read mode (Full screen reading).

d. Outline.

e. Draft.

For Microsoft Word 2016, the views that are located on the Ribbon and the status bar include the following;

I. Print layout: this is the default view for Microsoft Word when a compatible document is opened.

II. Read mode: this presents the document in an e-book like manner.

III. Web layout: it displays the document like a web page.

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

Each page of notes should include
a.
Date, topic, class
c.
Page numbers, date and topic
b.
Class, homework assignment, date
d.
None of these


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

A

Explanation:

Date, Topic, Class

discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization

Answers

MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.

It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.

The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.

Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.

For more such questions on Management Information System, click on:

https://brainly.com/question/14688347

#SPJ8

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

11. Which of these types of programa is bothersome but not necessarily dangerous?
A Worm
B. Adware
C. Virus
D. Trojan

Answers

Answer:

Virus

Explanation:

Your answer should be C. Virus

A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted?

a. Credentialed
b. Non-intrusive
c. SYN
d. Port

Answers

Answer:

i think it A i hope it right

Explanation:

State OLLORS Assignment 5 uses of Database Management. Answer​

Answers

Database management has several important applications, including data storage and retrieval, data analysis, data integration, security management, and data backup and recovery.

One of the primary uses of database management is to store and retrieve data efficiently. Databases provide a structured framework for organizing and storing large volumes of data, allowing users to easily access and retrieve information when needed.

Another key application is data analysis, where databases enable the efficient processing and analysis of large datasets to derive meaningful insights and make informed decisions. Database management also plays a crucial role in data integration, allowing organizations to consolidate data from various sources into a single, unified view.

Additionally, database management systems include robust security features to ensure the confidentiality, integrity, and availability of data, protecting against unauthorized access and data breaches.

Finally, databases facilitate data backup and recovery processes, allowing organizations to create regular backups and restore data in the event of system failures, disasters, or data loss incidents.

Overall, database management systems provide essential tools and functionalities for effectively managing and leveraging data in various domains and industries.

For more questions on Database management

https://brainly.com/question/13266483

#SPJ8

4. How do the words describing nature in
lines 12-14 contribute to the tone of the passage?


Answers

Can you add the passage ?

Write a program
that accepts an object's mass (in kilograms) and velocity (in meters per second) as
inputs and then outputs its momentum

Answers

Answer:

Explanation:

learn the 5 R's: refuse, reduce, reuse, rot, recycle: Going zero waste is a great step towards combating climate change. ...

bike more and drive less: ...

conserve water and protect our waterways: ...

eat seasonally, locally, and more plants: ...

switch to sustainable, clean energy:

Can anyone do this I can't under stand

Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand

Answers

Answer:

I think u had to take notes in class

Explanation:

u have yo write 4 strings

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use? PST OST MSG ZIP

Answers

Answer:

He will use PST

Explanation:

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. The type he will use is PST. The correct option is A.

What is the PST file type?

PST file to Outlook so that you can work with the items in it. A personal storage table (PST) file is a proprietary file format created by Microsoft to store copies of messages, calendar events, and other items.

This is done within their software platforms, including Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook. Point to Open on the File menu, then select Outlook Data File. Click OK after selecting  Pst file you want to open.

Therefore, the correct option is A. PST is the file type that is used to export files from his mailbox.

To learn more about PST file type, refer to the link:

https://brainly.com/question/15272900

#SPJ6

Please I need help with the program using Java, it is about the blackjack game and roulette in the casino.
For blackjack, I wrote like this:
int dealer = (int)(Math.random()*10) + 1; // generate random number between 1-10 for dealer
int player = (int)(Math.random()*10) + 1; // generate random number between 1-10 for player
for roulette like this:
int randomNumber = (int)(Math.random()*35) + 1; // generate random number between 1-36
is it correct? If not can you please help me?

Answers

Your written code for generating random numbers for both blackjack as well as roulette is correct.

What is the program  about?

For blackjack, you generate a chance number between 1 and 10 for two together the dealer and the performer using the Math.haphazard() method, and before you increase 1 to the result to get any between 1 and 10. This will work well for the ticket game where the program values are middle from two points 1 and 10, and there is no need to produce numbers above 10.

For roulette, it  will work well for the game of game depending on luck, where practice on the wheel range from 1 to 36.

Learn more about program  from

https://brainly.com/question/23275071

#SPJ1

Natalie is creating a game. The object of the game is for the player to get a cat to his toy in 10 moves or less. The game begins with the cat positioned at the top-left corner of the screen and the toy at the bottom-right corner of the screen. Natalie wants the player to be able to make the cat go 50 steps in one move by pressing an arrow key, and go 100 steps in one move by pressing the space bar. The number of remaining moves is decreased by one each time the player presses a key. The game will count down from 10 moves and display the number of moves remaining. If the move count reaches zero or the cat reaches his toy, then the game will start over. Natalie discovers that her program is not restarting when the number of remaining moves reaches zero. Consider the following code segment: if movesRemaining = 0 then What is wrong with this expression that Natalie wrote?

Answers

Answer: she forgot to write a loop program like while, or for

Explanation:

Which properties of the word "readability” changed?

Answers

The properties of the word "readability” that has changed are;

Its caseIts  colorIts  sizeIts style

What is readability?

The term readability is known to be the ease that any given reader do feel when they are said to understand any kind of written text.

Note that In natural language, the readability of text is one that is based on its content as well as the presentation and it entails its font size, line height, character spacing, and others.

Note that it also entails:

The Speed of perceptionIts Visibility, etc.

Therefore, The properties of the word "readability” that has changed are;

Its caseIts  colorIts  sizeIts style

Learn more about readability from

https://brainly.com/question/3923453

#SPJ1

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

Other Questions
How does the Federal Reserve Banks selling of newly issued Treasury bonds affect the money supply? What are the steps that lead to increased excitability in a neuron when ne is released presynaptically? The demand for coffee is relatively... for consumers who consider tea and other beverages to be close substitutes. When consumers have a lot of time to react to a price increase, demand becomes more ... because they can find other options or ways to reduce consumption. If a drug like insulin is a necessity for a consumer, their demand is likely to be relatively .... For most consumers, a car payment is a significant portion of their budget; this means that the demand for new cars is likely to be relatively... a farmer has pigs and chickens in the ratio 3:8. if she has 360 pigs, how many chickens does she have Please answer this question for a quick 100 points write about imprisonment250 words(no scammers) In a collection of 50 cards, Sal has some valuable and some regular cards. He has 16 more valuable cards than regular cards. How many of each kind of card does Sal have? Explain the situation using an equation and solve. (whoever has correct answer gets brainliest) In 2010, the population of a city was 230,000. From 2010 to 2015, the population grew by 7%. From 2015 to 2020, it fell by 4%. To the nearest 100 people, what was the population in 2020? what did frederick douglass see as a young boy while living with his grandmother with the slaves treatment 2. Exhibit a string over the alphabet {a,b} that does not belong to (au ba)*(bUab)*. Justify your answer. (No formal proof is needed.) Hint: You may want to construct an NFA for this regular expression. Online, Terrell found a soup recipe that requires 1/4 of a teaspoon of pepper for every 1/2 of a teaspoon of dried basil. For a big event, Terrell wants to make a huge pot of soup. If he uses 1 teaspoon of dried basil, how much pepper should he use? Calculate the entropy change for the gas. (2b)Calculate the entropy change when 14 g of nitrogen expand from a volume of 10 L to a volume of 30 L at the same temperature. Assuming ideal behaviour for the nitrogen gas Given that f(x)= 4x-3 and g(x)= 2x-1 over 3 solve for g(f(2)) The Russian steppe was best suited to which of the following: A) Planting and harvesting various grains B) Trapping fur-bearing animals C) Cutting timber OD) Grazing cattle and horses Kyle is making a frame for a rectangular piece of art. The length of the frame is 3 times the width, as shown below. A rectangle with a length of 3 x and height of x. If Kyle uses 18 feet of wood to make the frame, what is the length of the frame? 6. 75 4. 50 2. 25 9. 0. The speaker of the house is the leader of the? 7 men build a house in 300 days. How many men will it take if they work at the same tempo, buil the house in 70 days? Provide any THREE (3) reasons for executing aninduction exercise within an organization. When copper is bombarded with high-energy electrons, X rays are emitted. Calculate the energy (in joules) associated with the photons if the wavelength of the X rays is 0.154 nm. what is the genotype of parent 2?