What organizational pattern is the author utilizing?

Companies are not blind to insider computer security abuse—nor are they indifferent. Last year midsized and large companies spent in excess of $2 million on average to address computer security. They spent an estimated $1.1 billion in aggregate simply to patch the software “holes” that hackers might use to gain entry to systems. Insiders, of course, already have entry. What to do about them? A survey of 2,500 information security officers and others (conducted by Information Security magazine) found that insider attacks occur more often than external breaches, yet the top priority among those surveyed was securing the “network perimeter” against external threats. (Leibs, Internet)

a. description
b. cause and effect
c. statistical analysis


c. statistical analysis

Language Arts & World Languages

You might also like to view...

______The following thesis statement—used in response to a narrative writing assignment about personal writing experiences—includes critical analysis: Before high school, my writing experiences had been atrocious, so I despised writing, but that all changed when I entered my ninth-grade year and took Mrs. Miller's challenging, exciting, and relevant English class

a. True b. False Indicate whether the statement is true or false

Language Arts & World Languages

Write the appropriate identification in each blank: P—good parallel structure; NP—nonparallel structure. The newspapers are filled with stories of how deserters are working as spies and they create havoc in the provinces

What will be an ideal response?

Language Arts & World Languages

When finding an implied main idea, what is the first step?

a. Look for details b. Look for the ‘point' c. Create a topic sentence d. Identify the topic

Language Arts & World Languages

Comparing involves discovering _______________; contrasting is based on finding ____________.

Fill in the blank(s) with the appropriate word(s).

Language Arts & World Languages