1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
1 year ago
15

which one of the following would not normally be found in an organization's information security policy?

Computers and Technology
1 answer:
kotegsom [21]1 year ago
4 0

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

You might be interested in
Regularly tuning up a computer can assist with keeping it running at peak speed.
Lady_Fox [76]
The answer to your question, is true
hope this helps :D
3 0
3 years ago
In which of the following ways can using test-taking tips help you?
bogdanovich [222]
In my opinion i think it is A
3 0
3 years ago
Program 7 - Circle You write ALL the code, then run it - Produce the correct output. Turn in code and screen print of successful
fgiga [73]

Answer:

Here is the Circle class:

public class Circle {   // class definition

private int radius;    // private data member of type int of class Circle named radius that stores the value of radius

public Circle(int r) {   // parameterized constructor of class Circle that takes radius as argument

 radius = r;  }    // sets value of radius as r

public int getRadius() {   // accessor method to get the value of radius

 return radius;  }   // returns the current value of radius

public int Diameter() {   // method to compute diameter of a circle

 return radius * 2;  }   // multiply radius value by 2 to compute diameter of Circle

 

public double Area() {   // method to compute area of a circle

 return Math.PI  * Math.pow(radius, 2);   }   //the formula of area is

π x radius² where value of π is get using Math.PI

 

 public double Circumference() {   // // method to compute circumference of a circle

 return 2* Math.PI * radius;   }   }  //the formula of circumference is

2 x π x radius where value of π is get using Math.PI

Explanation:

Here is the Main class:

import java.util.Scanner;  //to accept input from user

public class Main {  //definition of Main class

public static void main(String[] args) {  //start of main method

   

    Scanner scanner = new Scanner (System.in);  //creates Scanner object to take input from user

    System.out.println("Enter radius: ");  //prompts user to enter radius

    int r = scanner.nextInt();  //reads the value of radius from user

 Circle c = new Circle(r);  // calls Constructor of Circle passing r as argument to it using the object c of class Circle

 

    if(c.getRadius()<=0){  //calls getRadius method to get current value of radius using objec and checks if this value (input value of r ) is less than or equal to 0

        System.out.println("Error!");   }  //when above if condition evaluates to true then print this Error! message

    else {  //if the value of radius is greater than 0

System.out.println("the radius of this Circle is: " +c.getRadius());  //calls getRadius method to return current value of r (input value by user)

System.out.println("the diameter of this Circle  is: " + c.Diameter());  //calls Diameter method to compute the diameter of Circle and display the result on output screen

System.out.printf("the circumference of this Circle  is: %.2f", c.Circumference());  //calls Circumference method to compute the Circumference of Circle and display the result on output screen

System.out.println();  //prints a line

System.out.printf("the Area of this Circle  is: %.2f", c.Area()); } }  }

//calls Area method to compute the Area of Circle and display the result on output screen

The program and its output is attached.

7 0
3 years ago
Landing pages in a foreign language should never be rated fully meets?
PilotLPTM [1.2K]

Answer:

if the landing page provides all kind information of information as to that site people usually like it or will most likely enjoy it

BRAINLIEST?????

Explanation:

3 0
3 years ago
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
Other questions:
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • Given an integer variable i and a floating-point variable f, write a statement that writes both of their values to standard outp
    12·1 answer
  • On a piano, each key has a frequency, and each subsequent key (black or white) is a known amount higher. Ex: The A key above mid
    14·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explore
    12·1 answer
  • What are different between system and application software?​
    14·1 answer
  • What are important acronyms we use when we talk about the internet? this is for computer science.
    12·1 answer
  • PLEASE HELP ASAP
    7·1 answer
  • Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
    6·1 answer
  • Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!