It was 8:03 A.M. when Jiao Jan, the Network Administrator fo…

It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and downloaded several files from the company’s server. Using the notation for the time-based model of security, in this case

A CIO designed a model to predict when employees would have…

A CIO designed a model to predict when employees would have IT problems and call the IT department for help. The CIO then used the model to automatically schedule more employees to work during peak times. The CIO likely computed what type of analytic for scheduling?