1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
2 years ago
7

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o

f the person who prepared the workbook, and the date it was created. _________________________
Computers and Technology
1 answer:
emmainna [20.7K]2 years ago
4 0

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created: True.

<h3>What is a worksheet?</h3>

A worksheet is also known as a spreadsheet and it can be defined as a type of document which comprises cells that are arranged in a tabulated format (rows and columns).

In Computer technology, some of the common business practice include the following:

  • Creating a worksheet named Documentation with a description of the workbook.
  • The name of the person who prepared the workbook.
  • The date it was created.

Read more on worksheet here: brainly.com/question/4965119

#SPJ1

You might be interested in
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
How can an antivirus protect your device​
Igoryamba
Antivirus software protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account. Antivirus protection scans your files and your incoming email for viruses, and then deletes anything malicious
3 0
2 years ago
Read 2 more answers
What is a software that allows the user to modify and redistribute?
lara31 [8.8K]
A software that does and allows this is free software
8 0
4 years ago
Which stage of the waterfall model is most like the simple model's stage 5?
Tema [17]
Maintenance, Output requirements, Forking. This one is tricky because one would think "input", but everything that is inputted must be outputted, so they are combined. The simple model of development. It's pretty self explanatory. Communications between programmers who are working on related features. Version control is all about communication--- so this is the most logical option. Even though "The features that are currently being development. 
8 0
3 years ago
Which of the following is a benifit of googling yourself ?
finlep [7]

Answer:

you are protecting yourself from identity theft

6 0
2 years ago
Other questions:
  • Alan wants to find an image of a car he can use in a presentation. What button should he click in the Images group to run a sear
    5·1 answer
  • Which of the following is an example of a Boolean condition that Python could recognize?
    9·1 answer
  • A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
    14·1 answer
  • A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir
    7·1 answer
  • Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w
    11·2 answers
  • Explain briefly why you cannot expect to find a previous version of every file with which you work.
    10·2 answers
  • What finger should be on the K key?<br> 1. Pinky<br> 2. Index <br> 3. Middle <br> 4. Ring
    9·1 answer
  • Question 1 (10 points)
    8·1 answer
  • Some problems are better solved by a computer and some are better solved by humans.
    10·1 answer
  • consider l= 5 ,r= 11. you must determine the sum of the values of the function in the range L to R . you have to calculate sum =
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!