What is the difference between requirements and controls in the security process? Give examples of each.

Answers

Answer 1

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.


Related Questions

C++
Write a program and use a for loop to output the
following table formatted correctly. Use the fact that the
numbers in the columns are multiplied by 2 to get the
next number. You can use program 5.10 as a guide.
Flowers
2
4
8
16
Grass
4
8
16
32
Trees
8
16
32
64

Answers

based on the above, we can write the C++ code as follows..


 #include <iostream>

#include   <iomanip>

using namespace std;

int main() {

     // Output table headers

   cout << setw(10) << "Flowers" << setw(10) << "Grass" << setw(10) <<    "Trees" << endl;

   // Output table rows

   for (int i = 1; i <= 4; i++) {

       cout << setw(10) << (1 << (i-1)) * 2 << setw(10) << (1 << i) * 2 << setw(10) << (1 << (i+2)) * 2 << endl;

   }

   return 0;

}

How does this work ?

Using the iomanip library's setw function, we ensure that the output of this program is properly formatted and aligned in columns. To calculate the values in each column, we iterate through every row of the table via a for loop and rely on bit shifting and multiplication.

As our code outputs these values to the console using << operators, we use endl to create new lines separating each row. The return 0; statement at the very end serves as an indication of successful completion.

Learn more about C++:

https://brainly.com/question/30905580

#SPJ1

Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!

Answers

The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:

A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))

Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.

eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.

eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.

The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.

You can also create the matrix A by using following code:

A = [-4 2 1; 2 -4 1; 1 2 -4]

It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.

where do you think data mining by companies will take us in the coming years

Answers

In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse  facets of our daily existence.

What is data mining

There are several possible paths that data mining could lead us towards.

Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.

Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ1

Discuss the term internal control​

Answers

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST

Complete each of the following sentences by selecting the correct answer from the list of options.

The CPU converts
into information.

The CPU is the mastermind of the computer, controlling everything that goes on through a series of
.

Another name for the CPU is
.

Answers

The CPU converts instructions and data into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of electrical signals and calculations.

The CPU, or central processing unit, is the primary component of a computer that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer.

The CPU interprets and executes instructions, performs calculations, and manages the flow of data within the computer system. It is responsible for coordinating and controlling the activities of other hardware components, such as memory, storage, and input/output devices, to carry out tasks and run programs.

Learn more about CPU on:

https://brainly.com/question/21477287

#SPJ1

Select the correct answer. Who takes care of the final layout of the product that meets the standards set by UX designers? A. web developer B. design director C. UX designer D. UI designer

Answers

Answer:

D. Ui designer...............................................................

Explanation:

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

Which device is not considered a computer?

a smartphone
an analog controller

Answers

Answer:

An analog controller is not considered a computer because you just move around the controls. You don't stare at a screen like a smartphone, so it is not a computer.

Explanation:

During a system board replacement, a new TPM is installed. What is the next best step to take?

Answers

The step to install TPM involves the connection of the chip to the connector and snapping of the bolt in its place by pressing down the plastic bolt.

What is a TPM?

A TPM is given as the Trusted Platform Module. It is a computer chip that enables the storage of the artifacts at a safe location for the authentication of the system.

In the system board replacement, the TPM installation is followed by the insertion of the TPM chip in the TPM connector, and pressing down the security rivet in the form of the plastic bolt to make the bolt snap in its place.

Learn more about TPM, here:

https://brainly.com/question/15202666

#SPJ1

Which of the following is NOT a web browser?
Safari
Chrome
Bing
Firefox

Answers

Answer:

Bing

Explanation:

Bing is an engine not a browser

We are required to state which of the following is not a web browser.

From the options given, Bing is not a web browser.

Bing is a search engine just like Yahoo too is also a search engine.

Search engines refers to a web-based tool that enables users to find information on the World Wide Web(WWW).

Browsers on the other hand are software applications that are used to access World Wide Web(WWW). Examples of browsers includes: opera mini, Firefox, chrome, uc browser, safari etc.

Therefore, from the options given, Bing is not a web browser.

Read more:

https://brainly.com/question/17331568

When turning on any circuit breaker , you should always stand A. At arm’s length from the load center
B.in front of the device
C. To the side of the load center
D . About two feet from the device

Answers

Answer:C. To the side of the load center

Explanation:

If you wanted to help your phone , a nonliving thing , perform the process of life which is to gain energy which would be the best description of what to do ?

Help

If you wanted to help your phone , a nonliving thing , perform the process of life which is to gain energy

Answers

Answer:

d. plug it into the charger.

Explanation:

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

Which of the following characteristics currently used today for authentication purposes is the LEAST unique?
A) Fingerprints
B) Iris
C) Retina
D) Face geometry

Answers

A characteristics currently used today for authentication purposes is the LEAST unique is Face geometry.

About face recognition

Face recognition is a biometric technique used to identify individuals from digital images or video recordings. This technology relies on computer algorithms to detect and identify a person's face. Computer algorithms can easily recognize an individual's face based on a number of unique features, such as the shape of the eyes, nose and lips.

Facial recognition technology has been used for a variety of purposes, from security to marketing applications. In the past, this technology was often seen as expensive and difficult for the general public to access. However, the technology has undergone significant development over the last few years and now it can be used as a payment method based on facial recognition.

Components of Performing Face Recognition

Face recognition is a type of identification system using the "biometric" method. In addition to facial recognition, biometrics are also used for fingerprint recognition, eye retina scanning, voice and signatures.

To perform face recognition requires several components, including:

Camera, to scan faces. Database, contains faceprint / face scan data. The algorithm, tasked with comparing the results of the facial prints made by the target with the face prints in the database.

Learn more about facial recognition at https://brainly.com/question/14640106.

#SPJ4

Which model allows designers to use a graphical tool to examine structures rather than describing them with text?

Answers

A model which allow designers to use a graphical tool to examine structures rather than describe them by using text is called entity relationship.

What is an entity relationship?

An entity relationship can be defined as a data model with the highest level of abstraction and it is designed and develop to avail designers an ability to use a graphical tool to examine structures rather than describe them by using text.

This ultimately implies that, an entity relationship can be used to label the various relationship types based on connectivity, especially through the use of a graphical tool to examine structures rather than describe them with text.

Read more on entity relationship here: https://brainly.com/question/14530873

#SPJ1

Imagine that you want to build a radio telescope and an optical telescope and that you want them to both have the same angular resolution, assume that both telescopes can reach the diffraction limit. Which telescope will have to have a larger diameter? Explain your reasoning.

Answers

Answer:

The radio telescope will have to have a larger diameter than the optical telescope in order to achieve the same angular resolution. This is because radio waves have a longer wavelength than optical waves, and the angular resolution of a telescope is inversely proportional to the wavelength of the radiation it is observing. Since the radio waves have a longer wavelength, the telescope observing them will need a larger diameter in order to achieve the same level of resolution as a telescope observing optical waves. Additionally, the diffraction limit for radio telescopes is greater than for optical telescopes, so the radio telescope will need to be larger to reach the diffraction limit.

Write a class definition named Book. The Book class should have data attributes for a book’s title, the author’s name, and the publisher’s name. The class should also have the following:

An _ _init_ _ method for the class. The method should accept an argument for each of the data attributes.

Accessor and mutator methods for each data attribute.

An _ _str_ _ method that returns a string indicating the state of the object

Answers

Make a class called "Book" that has data attributes for the title, author, and publisher. Include an initialization method, accessor and mutator functions for each attribute, and a str function to show the current state.

What do Python class members accessors and mutators do?

A function that returns a duplicate of an internal variable or computed value is known as an accessor method. These are frequently given names that begin with the word get. A function that slightly alters the value of an internal data variable is known as a mutator method.

function __init__(self, title, author, publisher) class Book:

       self.title is the same as title self.Author is the same as the author.Publisher is also Publisher.

   Define get_title() and return self.title.

   self.title = title; def set_title(self, title);

   return self.author from the function def get_author

   self.author equals author in the definition of set_author(self, author).

   return self.publisher from the function def get_publisher

   set_publisher(self, publisher) should be defined as self.Publisher is also Publisher.

   return f from def __str__(self): "'self.title' by'self.author', published by'self.publisher'"

To know more about data visit:-

https://brainly.com/question/13650923

#SPJ1

How did early computing device such as Charles Babbage's analytical engine and Ada Lovelace's contributions set the foundation for modern computing

Answers

Early computing devices, such as Charles Babbage's Analytical Engine and Ada Lovelace's contributions, played a crucial role in setting the foundation for modern computing. Here's how their work contributed to computing development:

1. Charles Babbage's Analytical Engine: Babbage designed the Analytical Engine, a mechanical general-purpose computer concept, in the 19th century. Although the Analytical Engine was never fully built, its design and principles laid the groundwork for modern computers. Key features of the analytical engine include:

a. Stored Program: Babbage's Analytical Engine introduced the concept of storing instructions and data in memory, allowing complex calculations and tasks.

b.  Control Flow: The Analytical Engine could make decisions and perform conditional operations based on previous computations, resembling the modern concept of control flow in programming.

c. Loops: Babbage's design incorporated looping mechanisms, enabling repetitive instruction execution, similar to modern programming languages.

2. Ada Lovelace's Contributions: Ada Lovelace, an English mathematician, collaborated with Charles Babbage and made significant contributions to computing. Her work on Babbage's Analytical Engine included writing the first algorithm intended for machine implementation. Lovelace realized the potential of the analytical engine beyond numerical calculations and recognized its capability for processing symbols and creating complex algorithms. Her insights laid the foundation for computer programming and algorithms.

Lovelace's ideas about the analytical engine extended beyond what was initially envisioned. He stressed the importance of machines handling more than just numbers. Her contributions demonstrated computers' potential to perform tasks beyond basic calculations and numerical processing.

Collectively, Babbage's analytical engine and Lovelace's contributions provided early conceptual frameworks for modern computing. Their ideas influenced subsequent pioneers in the field, and the concepts they introduced paved the way for the development of the digital computers we use today.

Question 41
What is an another name of Personal Computer?
A OMicro-Computer
BOPrivate Computer
CODistinctive Computer
DOIndividual Computer

Answers

A personal computer, also known as a micro-computer, is a type of computer designed for individual use by a single person. Option A

It is a general-purpose computer that is meant to be used by an individual for various tasks, such as word processing, web browsing, gaming, and multimedia consumption. Personal computers are widely used by individuals in homes, offices, and educational institutions.

Option B, "Private Computer," is not a commonly used term to refer to a personal computer. The term "private" does not accurately describe the nature or purpose of a personal computer.

Option C, "Distinctive Computer," is not an appropriate term to refer to a personal computer. The term "distinctive" does not convey the common characteristics or usage of personal computers.

Option D, "Individual Computer," is not a commonly used term to refer to a personal computer. While the term "individual" implies that it is meant for individual use, the term "computer" alone is sufficient to describe the device.

Therefore, the most accurate and commonly used term to refer to a personal computer is A. Micro-Computer. This term highlights the small size and individual-focused nature of these computers. Option A

For more such questions micro-computer visit:

https://brainly.com/question/26497473

#SPJ11

describe how computer technology is intergrated in manufacturing, theatre and education. ​

Answers

Computer technology is integrated in manufacturing, theatre and education It allows theatrical possibilities to be broadcast across the world.

How computer technology is integrated in education?

Integration of technology in education simply guides to the use of technology to enhance the student learning experience. Utilizing various types of technology in the classroom, including a virtual classroom, creates learners who are vigorously confronted with learning objectives.

How technology is integrated in theatre or the arts?

Modern technology has made it easier for cinemas to upgrade the visual appeal of their presentations and accomplish a variety of tasks. Through automation and 3D printing, sets can be completed faster, contain more detail and pull viewers more in-depth into the setting and story.

To learn more about Computer technology, refer

https://brainly.com/question/17506968

#SPJ9

After an organization experiences a significant data breach, the lead cyber technician is tasked with providing a presentation on various cyber-attacks. What types of attacks are associated with application attacks? (Select the best three choices.)

a. ARP Poisoning
b. Replay
c. Cross-site Scripting
d. Pass the Hash

Answers

The types of attacks that are associated with application attacks are:

b. Replay

c. Cross-site Scripting

d. Pass the Hash

What is the cyber-attack?

Cross-spot Scripting (XSS): This is a type of attack where an aggressor injects malicious law into a website or web use, which can therefore be executed in the consumer's browser. This maybe used to steal delicate information, in the way that login credentials or credit card numbers.

Replay: This is a type of attack place an attacker intercepts network traffic and therefore replays it later, allowing ruling class to perform conduct on behalf of the authentic user. This can be used to imitate the user and act unauthorized conduct.

Learn more about cyber-attack from

https://brainly.com/question/27665132

#SPJ1

For current events, what type of sources would we use to learn about them?

A”Scholarly journals

B”News sources (broadcast, web, print)

C”Books

D”Reference works (encyclopedias, almanacs, etc.)

For current events, what type of sources would we use to learn about them?AScholarly journalsBNews sources

Answers

Answer:

B. News Sources (broadcast, web, print)

Explanation:

To learn about current events the most ideal sources of reference are News sources, either broadcast, web or print.

For example, if you're seeking breaking news or stories that are developing in the business world, the following sources are News sources you can turn to as sources of reference: CNN Business, Forbes, Bloomberg's Business Week, Fortune and other relevant Business News Media outfits.

A number is a palindrome if its reversal is the same as itself. Write a program ReverseNumber.java to do the following:
1. Define a method call reverse, which takes a 4-digit integer and returns an integer in reverse. For example, reverse(1234) should return 4321. (Hint: use / and % operator to separate the digits, not String functions)
2. In the main, take user input of a series of numbers, call reverse method each time and then determine if the number is a palindrome number, for example, 1221 is a palindrome number, but 1234 is not.
3. Enhance reverse method to work with any number, not just 4-digit number.

Answers

The reverse method takes an integer as input and reverses it by extracting the last digit using the modulus operator % and adding it to the reversed number after multiplying it by 10.

The Program

import java.util.Scanner;

public class ReverseNumber {

   public static int reverse(int number) {

       int reversedNumber = 0;

       while (number != 0) {

           int digit = number % 10;

           reversedNumber = reversedNumber * 10 + digit;

           number /= 10;

       }

      return reversedNumber;

   }

   public static boolean isPalindrome(int number) {

       return number == reverse(number);

   }

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter a number: ");

       int number = scanner.nextInt();

       

       if (isPalindrome(number)) {

          System.out.println(number + " is a palindrome number.");

       } else {

           System.out.println(number + " is not a palindrome number.");

       }

   }

}

Read more about Java program here:

https://brainly.com/question/26789430

#SPJ1

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

Answers

If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.

Which credit card ought to I settle first?

You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.

The ways to Pay Off Debt More Quickly are:

Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.

Learn more about credit payoff strategy from

https://brainly.com/question/20391521
#SPJ1

See full question below

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

a) Pay off the bicycleas slowly as possible

b) Pay $100 per month for 10 months

c) Pay $250 per month until it's paid off

Which of the following are part of personal growth? Check all of the boxes that apply. increasing self-awareness improving quality of life avoiding setting goals developing skills

Answers

Answer:Increasing self awareness

improving quality of life

developing skills

Explanation: core

increasing self-awareness

improving quality of life

developing skills

1 cup coffee cream = ____ tbsp butter plus ____ c milk

Answers

This is a tech Question?

Answer: NO!

Example of vector image format​

Answers

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

which windows and network location enables network discovery and allows files and printers to be easily shared ​

Answers

The Private network location is the windows and network location enables network discovery and allows files and printers to be easily shared ​

How to determine the window

In Windows, the organized area that empowers organize disclosure and permits simple sharing of records and printers is the Private network location.

After you set your arrange association to the Private network location, it empowers different arrange highlights, counting organize revelation, record sharing, and printer sharing.

By default, Windows categorizes arrange associations into three sorts:

PublicPrivateDomain

The Private network location is the foremost prohibitive, constraining organize disclosure and impairing record and printer sharing for security reasons.

Learn more about windows at: https://brainly.com/question/27764853

#SPJ1

The feature, located on the Ribbon, allow you to quickly search for commands or features.

Answers

MS Office's Quick Access Toolbar: No matter which tab is selected, the Quick Access Toolbar, which is located directly above the Ribbon, gives you access to basic actions. It displays the Save, Undo, and Redo commands by default, but you can add other commands as necessary.

What is Quick Access Toolbar?The Quick Access Toolbar is always visible on the far left of the File Explorer title bar by default. Look at the top of a File Explorer window that is open in Windows 10. In the upper-left corner, you can see the Quick Access Toolbar in all of its understated beauty. Although you can simply display the QAT below the Ribbon, it usually displays above the Ribbon by default. It may need to be enabled if you can't see it. Go to File - Options - Quick Access Toolbar in any Office suite program. Nevertheless, Windows 10 and Windows 11 both offer an easier method known as Quick Access. The Quick Access feature is immediately visible in the left sidebar after starting File Explorer.

To learn more about Quick Access Toolbar, refer to:

https://brainly.com/question/13523749

from the following list, select all the ways in which improvements in mis technologies and tools are likely to affect managers who telecommute.

Answers

They will be able to perform more duties on their mobile phones, and they will be subjected to additional work obligations in their spare time.

What exactly are MIS and tools?

Management information systems is the study of people, technology, organisations, and their interactions (MIS). MIS professionals help firms make the most of their investments in people, technology, and operational procedures. MIS is a people-oriented industry that focuses on providing services via the use of technology. If you're interested in technology and want to use it to improve people's lives, a degree in MIS could be for you.

Businesses employ information systems at various levels of operation to collect, process, and store data. Management gathers and disseminates this data into the necessary information.

To know more about MIS visit:

brainly.com/question/12977871

#SPJ4

Other Questions
for each of the actions below, select those actions below that are primarily in the network-layer data plane. the other actions that you don't select below then correspond to control-plane actions. describe the relationship between rex and rose mary on pages 42-47 Sarah can run 8.2 miles per hour. How many miles can she run in 2.5 hours? The most popular and critically admired player/s of silent films was/were ________ Which best describes why Wiesel and Spiegelman include Jewish children in their works? Using the following chart to make a plan for improving or maintaining your endurance in each fitness area you will have a chance to really revive your initial fitness plan is Tammy submit a fitness log to Teacher cardio respiratory endurance auto body exercise frequency after choosing the two tables for the new query, janice must relate the two tables using a common field. what is the common field between the two tables? .) how many ways are there to place testing dummies into the rollercoaster? b.) how many ways are there to place dummies into the roller coaster if the front car must have 3 or fewer testing dummies in it? c.) how many ways are there to place dummies into the roller coaster if the back car must be empty? d.) how many ways are there to place dummies into the roller coaster if the neither the front or back car can be It is found that in cha-cha chickens, the allele for a double comb (A) is dominant to the allele for a single comb (a). A mother with the genotype Aa and a father with the genotype Aa produce an offspring.What is the percent chance that the offspring will have a single comb?______ Word Bank: 75, 0, 100, 25, 50 En la base de la pirmide se encuentran las __________________________ que son los organismos capaces de crear su propio alimento. Consider the quadratic function. f(p) = p2 8p 5What are the values of the coefficients and the constant in the function? El pastel est listo. _______ ustedes. ComesComando No lo como Cmalo 1. Find the range for the group of data items.9, 10, 11, 12, 13The range is(Simplify your answer.) What variable in the diamonds dataset is most important for predicting the price of a diamond? How is that variable correlated with cut? Why does the combination of those two relationships lead to lower quality diamonds being more expensive? How did the location of the ancient cities of Harappa and Mohenjo-Daro contribute to their development? Someone pls help?!!!! Dr. King accuses the "white moderate" with being more devoted to ORDER than JUSTICE. What does this mean? Consider how the Civil Rights Movement inherently creates "disorder." an interest group that focuses on healthcare benefits for senior citizens would be an example of a(n) _____ group Any factor that leads businesses to collectively expect lower rates of return on their investments ______ investment demand. 1..Do a 1 page + written summary that includes a paragragh on each of the following:the benefits of swimmingthe front crawl - description and factsthe breast stroke description and factsthe butterfly stroke - description and factsthe backstroke description and factsthe sidestroke - description and facts..