1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
4 years ago
7

Information Governance (IG) consists of? A. the overarching policies and processes to optimize and leverage information while ke

eping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives; B. established frameworks and best practices to gain the most leverage and benefit out of IT investments and support accomplishment of business objectives; C. the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate D. All of the above
Computers and Technology
1 answer:
Tems11 [23]4 years ago
4 0

Answer:  A) the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives

Explanation: Information governance(IG) is the act for the information to store , create, archive,deleting, valuing etc.This step is used for making the information secure and optimizable when required. IG gives the control over the information with respect to particular policy.

Other options are incorrect because frameworks used for extraction of  most of IT investments is known as IT(Information technology ) governance and method used for ensuring the data for forming database is known as data governance .Thus, the correct option is option(A).

You might be interested in
Joan typed an entire page of her English essay. She is now at the bottom of her document and can’t see the top. What should Joan
polet [3.4K]

Answer:

I hope this help

The answer is Menu

7 0
3 years ago
Need this!!
Galina-37 [17]

Answer

Peer-to-peer network

Explanation

Social media video sharing networks a platform which is an entertainment based where members can share videos in a site. it allows easy integration with other social networking platforms to share and watch videos. To start  a social media video sharing network, Rebecca  is required to set up a Peer-Peer Network.

Peer-Peer network is created when two or more computers are connected and they are sharing resources without going through separate servers. That is a couple of computers are  connected via a Universal Serial Bus to transfer files.


3 0
4 years ago
Read 2 more answers
A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there
Delicious77 [7]
It is (D) because FAT 32 is the most secure option that is why it is most popular
7 0
3 years ago
Read 2 more answers
What is the purpose of installing updates on your computer?
Lostsunrise [7]

The purpose of adding updates to your computer are as follows:

  • Making sure your computer hardware can run the newest software programs
  • Ensuring the built-in virus protection software is up to date
  • Removing bugs and glitches from your operating system
  • Allowing your computer to run as fast as possible
4 0
2 years ago
Write a function called rotateRight that takes a String as its first argument and a positive int as its second argument and rota
elena-s [515]

Answer:

The function in Python is as follows:

def rotateRight(strng, d):

   lent = len(strng)

   retString = strng[lent - d : ] + strng[0 : lent - d]

   return retString

Explanation:

This defines the function

def rotateRight(strng, d):

This calculates the length of the string

   lent = len(strng)

This calculates the return string

   retString = strng[lent - d : ] + strng[0 : lent - d]

This returns the return string

   return retString

Addition:

The return string is calculated as thus:

This string is split from the <em>index passed to the function to the last element of the string, i.e. from dth to last.</em>

<em>The split string is then concatenated to the beginning of the remaining string</em>

3 0
3 years ago
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    13·2 answers
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp
    8·1 answer
  • Which statement describing an operating system's Search feature is true?
    5·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
    5·1 answer
  • Give two differences between EIRGP and RIP.
    14·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • What does l m a o actually mean?
    6·1 answer
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!