1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
15

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?A. Acceptable use policiesB. Encryption policiesC. Data loss policiesD. VPN policies
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
3 0

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

You might be interested in
Which statement is true for slide or positive film?
Hitman42 [59]

Answer:

B.

Slides or positive films give high quality pictures with higher color saturation and contrast.

Explanation:

The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide  or positive film.

6 0
3 years ago
A menu within a menu is called what?​
Aneli [31]

Answer:

a submenu

Explanation:

a menu inside a menu is called a submenu or recursive menu

4 0
3 years ago
What is one current method of detecting planets orbiting around other stars?
Gnoma [55]
C

D is the old way.

A they have not done yet

B not even a thing
5 0
3 years ago
Jordan says she cant access files on the server any more. No other user has reported this problem and she can PING the server fr
kramer

Answer:

Lan cable was disconnected or unplugged from jordan's PC

Explanation:

According to the scenario, no user other than Jordan has reported the problem which means that there was no issue in the network or server.

As IP address ping of 127.0.0.1 was successful means that the configuration of the IP address was also correct and the DHCP server was working correctly.

After all assessment one of the main cause could be the disconnection of the LAN cable from Jordan's computer.

6 0
3 years ago
Suppose you want to find a specific piece of hardware at the lowest price, and you don't mind if it's used. Which type of purcha
tino4ka555 [31]

Answer:

consumer-to-consumer auction site

Explanation:

The best type of purchase for this scenario would be a consumer-to-consumer auction site. These sites allow anyone to make a publication selling their product. This publication can be seen by anyone around the world. It is the best way of finding the cheapest prices for a specific item. The condition of the items on these sites can vary. The majority of the time they are used items in good conditions, but can also be new items or very worn out items being sold for parts.

7 0
3 years ago
Other questions:
  • What is a independent variable
    11·1 answer
  • True or false: Your digital footprint is all the information about you online that only you post. Group of answer choices
    12·2 answers
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Which of the following statement about CAD is NOT true A. It increase the productivity of designers B. It uses computer graphics
    8·1 answer
  • What is network topology? PLZZZ HURRY
    9·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • What was the effect of the norman conquest on the language of britain?
    11·1 answer
  • The editing of digital photos us about the same level of difficulty as editing an analog photo
    12·1 answer
  • An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
    10·1 answer
  • Write a method that makes the input string of sentences ending with and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!