1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
4 years ago
8

Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete

rrent
Computers and Technology
1 answer:
Mrac [35]4 years ago
7 0

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

You might be interested in
Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
Sphinxa [80]
<span>The answer is highlight cells, select the Insert tab, click on the number, select Date from the category box, highlight the correct format, and click OK.</span>
8 0
4 years ago
Which is a safe Internet behavior?
Westkost [7]
Don’t give out personal information
7 0
3 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
4 years ago
Look at the file pathway below. What is the folder name that the document "chemlab1.doc" is stored in?
goldfiish [28.3K]

Answer:

chemlab1.doc stored in biology folder which stored in folder studies which stored in mydocs folder which is in C local disk

Explanation:

5 0
4 years ago
To place controls on a form in a stacked layout, select all the controls and click the stacked button on the ____ tab.
Sidana [21]
<span>To place controls on a form in a stacked layout, select all the controls and click the stacked button on the Arrange tab.  </span><span>The </span>Arrange<span> tab is located in the  </span>C1ReportDesigner<span>'s Ribbon menu and provides shortcuts to the Edit, Auto Format, Grid, Control Alignment, Position, and Size menu functions. </span>
3 0
3 years ago
Other questions:
  • 1.What is Intellectual Property
    9·1 answer
  • Can I have help on this
    7·2 answers
  • Which type of loop is best if you do not know how many times you need the loop to run?
    8·1 answer
  • Tower Building Activity
    12·1 answer
  • What Fortnite skin is more og?
    5·2 answers
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
  • Write any one method to delete a table in writer​
    11·1 answer
  • Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
    11·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!