Answer:
are u in HS or college work
I am trying to understand
Answer:
The answer to this question is given below in the explanation section.
Explanation:
STEM is a curriculum based on the idea of educating students in four specific disciplines — science, technology, engineering, and mathematics — in an interdisciplinary and applied approach. The students who graduated in STEM-based education getting more paid and jobs than students who did not study the STEM-based education.
As in this question that John is considering his STEM education choices, and he wants to begin working in the technology field as soon as possible. He should pursue bachelor (graduate) degree in technology. Because after, passing out, he can begin working in technology easily.
Answer: (B) An insider
Explanation:
According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.
Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security
The 3 files you need to have for a successful mail merge are:
- An Excel spreadsheet works
- Outlook Contact List.
- Apple Contacts List or Text file, etc.
<h3>What is Mail Merge?</h3>
This is known to be the act of carrying out a Mail Merge and it is one where a person will need to use a Word document and a recipient list, that is an Excel workbook.
Files needed are:
- Text file,
- address files, etc.
The 3 files you need to have for a successful mail merge are:
An Excel spreadsheet worksOutlook Contact List.
Apple Contacts List or Text file, etc.
Learn more about mail merge from
brainly.com/question/20904639
#SPJ1