Answer:
The answer is "Option B"
Explanation:
The ability to learn and use basic computer hardware and software understanding to solve problems and to access information is known as computer fluency. and other options are not correct, that can be defined as follows:
- In option A, computer knowledge is a basic general awareness, that helps the user to use the computer more fluently, that's why it is not correct.
- In option C, It is an internal feature of the computer, that helps to transfer data, that's why it is not correct.
- In option D, computer information is also known as data that is stored in the computer, that's why it is not correct.
Hey there,
I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy.
For example: Jimmy ask billy "Am I fat Billy"
Billy tells Jimmy "No, Your not fat, you look just great".
But really, Jimmy is very fat.
The point is that people are going to say things that make you feel happy and something that you want to hear.
~Jurgen</span>
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security
The correct answer: Yes, mobile-style apps can run in a personal computer's desktop.
That is possible by means of a desktop application called emulatator. An emulator like Bluestacks allows a personal computer to run mobile-style apps by acting as a virtual drive in the personal computer's harddisk.
Emulation is successful if the system requirements of the mobile-application is met by the personal computer's system attributes such as Random Access Memory abundance, Random Access Memory speed, Processing speed (in some cases core abundance e.g. core 2) etc.
Some mobile-applications do not work in the personal computer's desktop, however, if this application requires platform specific functions such as mobile device's network provider etc.