1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
11

A security policy is a

Computers and Technology
1 answer:
777dan777 [17]3 years ago
3 0

Answer:

D: set of rules based on standards and guidelines

Explanation:

You might be interested in
With the range E2:E30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font
Nana76 [90]

Answer:

Attached are the excel screenshots

3 0
3 years ago
What is the largest possible value that the variable x can have after the code segment executes? 17 17 A 14 14 B 11 11 C 4
Bogdan [553]

Answer:

i dont know sorry man no problem listed

Explanation:

6 0
2 years ago
What happens to an LR if they troll/spam?
Mkey [24]
They have a chance of being blocked
8 0
2 years ago
When selecting font size in a document, ____ points equals one-inch-tall text?
IgorC [24]
Hello <span>Jhigg4685 
</span><span>

Answer: When selecting font size in a document, 72 points equals one-inch-tall text?


I hope this helps
-Chris</span>
3 0
3 years ago
Is it ok to give a website your zip code?
Salsk061 [2.6K]
When a website takes in personal information from a user, the owners of the website have no idea what was input, no matter how hard they tried. The information is not stored, and is used by Javascript APIs to locate your address to either ensure that it is valid, or so that you can choose your address.

It's completely safe, and if a website looks really, really sketchy, then just don't give them anything personal.

Another way to identify if a website is safe to give your personal information to is if you see "HTTPS" in the URL at the top of your browser. This means Hyper Text Transfer Protocol Secure, and is the protocol used to transfer information over the internet SECURELY, via encryption that only computers are able to decrypt, and will not show that information to owners of the server/website.
5 0
3 years ago
Other questions:
  • Need Help ASAP!
    14·2 answers
  • It is generally safe to provide your social security number to
    7·2 answers
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • Which is the last step in conducting a URL search?
    5·2 answers
  • Which elements are in the Sort dialog box? Check all that apply.
    9·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustm
    13·1 answer
  • If you want to share information with individuals who are internal to your organization, which type of network would you want to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!