1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
4 years ago
15

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?A. Acceptable use policiesB. Encryption policiesC. Data loss policiesD. VPN policies
Computers and Technology
1 answer:
tamaranim1 [39]4 years ago
3 0

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

You might be interested in
I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
Oduvanchick [21]

Answer:

Yes it should be safe

Explanation:

hope it helps :)

3 0
3 years ago
What is a saved link to a particular web page?​
il63 [147K]

Answer:

In a website, a hyperlink (or link) is an item like a word or button that points to another location. When you click on a link, the link will take you to the target of the link, which may be a webpage, document or other online content. Websites use hyperlinks as a way to navigate online content.

4 0
3 years ago
Write a program that completes the following requirements in C program:
m_a_m_a [10]

Answer:

#include<stdio.h>

#include<string.h>

int main() {

int n;

FILE *fp = fopen("salaries.txt", "r");

 

double sumSalaries = 0;

double quarterlySalary1, quarterlySalary2, quarterlySalary3, quarterlySalary4;

while(!feof(fp)) {

 

fscanf(fp, "%lf", &quarterlySalary1);

fscanf(fp, "%lf", &quarterlySalary2);

fscanf(fp, "%lf", &quarterlySalary3);

fscanf(fp, "%lf", &quarterlySalary4);

sumSalaries = sumSalaries + quarterlySalary1+quarterlySalary2+quarterlySalary3+quarterlySalary4;

printf("Salary Sum %lf: \n", sumSalaries);

printf("Income Type: ");

if(sumSalaries > 200000 ){

printf("h");

}

else if(sumSalaries >= 15000 && sumSalaries<=200000){

printf("m");

}

else{

printf("l");

}

printf("\n");

}

 

 

fclose(fp);

return 0;

}

Explanation:

4 0
4 years ago
If Z=52 and ACT=48 then BAT=​ with explanation??​
Alekssandra [29.7K]
In the given code, A = 2, B = 4, C = 6,.... , Z = 52.
So, ACT = 2 + 6 + 40 = 48 and
BAT = 4 + 2 + 40 = 46
6 0
3 years ago
What is the software that provides the mechanisms to access a database called?
NeX [460]

Answer:

Database Management Software.

Explanation:

The software that provides  the mechanism to access the database is called  Database Management Software.There are two types databases  SQL  and  No SQL.There are various types of  database Management Software  present online for ex:-My SQL,Microsoft SQL server,Microsoft Access,Postgres SQL,Mongo DB etc.

3 0
3 years ago
Other questions:
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·1 answer
  • Nathan notices his computer System is slowing down when he tries to copy documents to it he also gets a prompt I warned him that
    7·1 answer
  • How does is make you feel when you're kind to others? What are some opportunities in your life to be more kind to your friends a
    9·1 answer
  • What is an unknown network called
    6·1 answer
  • Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
    12·1 answer
  • A network administrator has configured a router for stateless DHCPv6 operation. However, users report that workstations are not
    13·1 answer
  • How do you make computers or microwaves?
    13·1 answer
  • Computer father known as​
    5·1 answer
  • Spoderman memes<br> im scared-
    15·2 answers
  • Question 1 of 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!