1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

Desktop computers are often provided in the workplace by organizations, and laptops may be as well. However, portable devices (s

uch as tablets and smartphones) may more commonly be allowed on a BYOD basis. Fora BYOD (personally-owned) device: A. Organizations always allow a personally-owned device to be set up in whatever way the owner determines, even if it accesses an organization's information resources. B. Security rules for BYOD devices are generally the same across organizations, so if the organization's policies are understood it is likely that all security rules are understood. C. Organizations may have requirements about how BYOD devices may be configured or used, as a condition of accessing the organization's information resources. D. BYOD devices are prohibited to ever access an organization's information resources
Computers and Technology
1 answer:
Marianna [84]3 years ago
8 0

Answer:

C. Organizations may have requirements about how BYOD devices may be configured or used, as a condition of accessing the organization's information resources.

Explanation:

BYOD or bring your own device is the choice of an organisation to allow its employees access the company's resources, following certain conditions or policies.

For a BYOD to be established, the company must have a remote database and a configured secured access must also be established. Users can then be able to access company resources with a unique ID, with their own devices. It is adopted sometimes to reduce the cost of procuring new devices.

You might be interested in
John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, televisions and many oth
Norma-Jean [14]
The answer would be b. Contemplate other products to introduce at the same time in this new market.
5 0
3 years ago
. List four different ways automation can be used in testing?
hichkok12 [17]

Answer:

Automation testing can be used for:

<u>Input-output test :</u> If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.

<u>Unit test :</u> This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.

<u>Integration test :</u> This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.

<u>Smoke Tests:</u> This test is executed immediately after implementation on production to ensure that the application is still functioning.

6 0
3 years ago
Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
White raven [17]
I can't get what do you need, but I guess it's a part of java code. I can explain what it means. It's used to unite two rising sorted arrays which are list1 and list2. The result is stored in result array. I suggest you to clearly explain your task as it's difficult to give you correct answer.
8 0
3 years ago
Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
Artyom0805 [142]

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {

       compute_pos();

     }

     

     public static void compute_pos(){

     Scanner scan = new Scanner(System.in);

     int sum = 0;

     int counter = 0;

     // Prompt the user to enter an input

     System.out.println("Enter your value");

     // user input is assign to the variable value

     int value = scan.nextInt();

     

     while(value != 0){

         if (value > 0){

             sum += value;

             counter++;

         }

         System.out.println("Enter your value");

         value = scan.nextInt();

     }

     // Display the value of sum to the user

     System.out.println("The sum of the positive number is: " + sum);

     // Display the value of counter to the user

     System.out.println("The number of positive number is: " + counter);

   }

}

Explanation:

The first line import the Scanner class which allow the program to read input from the user. The class Solution is then defined. Then the main method which signify the beginning of execution in the program is defined. A method is called inside the main method.

The method compute_pos is defined. Inside the compute_pos method, a scanner object scan is declared to accept input from the user via the keyboard.

The variable sum and counter is declared and assigned to 0.

A prompt is displayed to the user to input a value. The user input is accepted and stored in the variable value.

Then a while loop is use to check the user input if it is not equal to zero. If it is equal to zero, the loop will end. Inside the loop, we first check to see if the user input is greater than 0, if it is, we add it to the variable sum and increase our counter by 1. At the end of the loop, a prompt is again display to accept input from the user.

Outside the loop, we display the sum and counter to the user.

8 0
4 years ago
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
NARA [144]

Answer:

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications).

5 0
3 years ago
Read 2 more answers
Other questions:
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • . Network navigation devices, such as routers, help datatravel in bundles that are referred toas………..
    14·1 answer
  • The manager of a sports club has data about the club members' ages in a workbook. He wants to find which age is most common. Whi
    13·2 answers
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • My mac book airs touch pad stopped working and i can't click. what do i do?
    5·2 answers
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • Proxy download for school
    15·2 answers
  • Note oj cyber security​
    6·1 answer
  • You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers ha
    7·1 answer
  • 11:25
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!