1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
15

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?A. Acceptable use policiesB. Encryption policiesC. Data loss policiesD. VPN policies
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
3 0

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

You might be interested in
How are the internet and the World Wide Web different from each other
jeka94

The terms Internet and World Wide Web are often used interchangeably in everyday speech; it is common to speak it as " going on the Internet " when using a web browser to view web pages. However, the World Wide Web is only one of a large number of Internet services.

4 0
3 years ago
HELP FOR JAVASCRIPT: 01. What is prototypical inheritance? 02. How can JavaScript be used to improve accessibility on the web? I
Vlada [557]

Answer:

Following are the answer to this question:

Explanation:

Prototypical inheritance:

This inheritance is a part of the object-oriented programming, in the JavaScript, the prototype is also an instance of an entity, on this type of inheritance an object inherits another object directly, in which an instance could be composed of several sources which enable simple selective inheritance and a flat structure of delegation[[Prototype]].

Web accessibility using JavaScript:

In the website or web page, JavaScript is usually fully accessible if another script 's implementation has been device-independent, and the components are accessible to be used in assistive devices. It enables the developers to improve web page information, which helps in communication, data processing, and regulation, and it also helps in management.

3 0
3 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Weber believed that there is an inevitable destructive quality to which one of the four types of action?
weqwewe [10]

Answer:

instrumental-rational                                        

Explanation:

  • A sociologist Max Weber interpreted the effects of Industrial Revolution on social actions. He described the four types of social actions:

                     Traditional Social Action

                      Affective/Affectional Social Action

                     Value Rational Social Action

                  Instrumental-Rational  Social Action

  • Instrumental-rational means to pursue most efficient means to achieve a specific goal.
  • The goals of the actions are also used as a way of achieving certain objectives.
  • So instrumental rational means doing anything it takes to reach a certain goal that does not take into account the consequences of the actions taken to achieve this goal.  
  • For example an organization's goal is to make maximize profit so it will use most effective and economical means to achieve this goal. For example by decreasing workers not considering the affects on the workers of this action.
  • Another example is of a person who wants to gain money. He might rob others or sell drugs etc to get money. A student whose goal is to pass an exam in order to get a degree will give his time to study and might cheat in exam to pass the test.
  • In short any actions can be taken which leads to the achievement of  a certain goal.
  • According to Weber instrumental rationality is destructive because rather than pursuing means and making decisions by taking moral values into consideration, the basic focus is to achieve a goal and make decisions using efficiency not considering moral values.
8 0
3 years ago
Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
Degger [83]

Answer:

i think its b if not sorry

Explanation:

3 0
2 years ago
Other questions:
  • Which of the following is a true statement? Question 33 options: Data entities correspond to sources/sinks on a data flow diagra
    14·1 answer
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • What could be one rule to help your friend to blog safely
    6·2 answers
  • Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would
    7·1 answer
  • What is the range of possible sizes for side<br> x?<br> 4.0<br> 2.7
    8·1 answer
  • Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
    8·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • 8. Choose the 3 correct statements for the code below.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!