1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
15

A .jpg file is an example of which of the following file types

Computers and Technology
2 answers:
makvit [3.9K]3 years ago
7 0
A jaypeg file is others a picture of something or a file of art from a digital art software
egoroff_w [7]3 years ago
5 0
A .jpg file is going to be a picture. =)
You might be interested in
Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
Nezavi [6.7K]

Answer:

you suck

Explanation:

5 0
3 years ago
The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
MissTica
This statement is (True)
5 0
3 years ago
Read 2 more answers
What is the fullform of BIT​
Natalija [7]

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

The full Form of BIT is "Binary digit" which is the basic unit of information in computing . A Binary digit can be 0 or 1 . 0 represents off state & 1 represents on state .

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

8 0
2 years ago
Shooting phases in film and video editing​
Sedbober [7]

Answer:

Filmmaking involves a number of complex and discrete stages including an initial story, idea, or commission, through screenwriting, casting, shooting, sound recording and pre-production, editing, and screening the finished product before an audience that may result in a film release and an exhibition.

6 0
3 years ago
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
Other questions:
  • Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
    5·2 answers
  • What task did the u.s. government undertake that many people identify as the birth of the internet
    5·2 answers
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • Is a bottle opener considered an engineered item?
    12·1 answer
  • . Write at least three benefits of using a network.​
    8·1 answer
  • Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
    9·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
  • Computer professionals known as software engineers, or Blank______, use the software development life cycle to create software r
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!