1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
11

A security policy is a

Computers and Technology
1 answer:
777dan777 [17]3 years ago
3 0

Answer:

D: set of rules based on standards and guidelines

Explanation:

You might be interested in
How can you protect your information when using wireless technology
Mnenie [13.5K]

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

8 0
2 years ago
Complete the sentence.<br> The IP protocol creates and addresses packets at the _____ layer.
brilliants [131]
Addresses packets at the internet layer
4 0
2 years ago
Read 2 more answers
Which statement about broadcasting a slideshow online is true?
9966 [12]

Answer: PowerPoint has a free, built-in service for broadcasting online.

Explanation:

The statement that's true about the broadcast of a slideshow online is that PowerPoint has a free, built-in service for broadcasting online.

Option 1 is wrong as all transitions are not properly displayed to the audience when broadcasting online.

Option 2 is wrong as broadcasting as slideshow online is an option for most PowerPoint users.

Option 3 is wrong because when broadcasting online, third party desktop sharing software isn't necessarily an option and it isn't a must that it must be used.

Therefore, the correct option is 4.

4 0
3 years ago
Read 2 more answers
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
. List four different ways automation can be used in testing?
hichkok12 [17]

Answer:

Automation testing can be used for:

<u>Input-output test :</u> If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.

<u>Unit test :</u> This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.

<u>Integration test :</u> This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.

<u>Smoke Tests:</u> This test is executed immediately after implementation on production to ensure that the application is still functioning.

6 0
3 years ago
Other questions:
  • Jeremy’s office is in an earthquake prone area. His web server is in his office. What step should he take to protect the data on
    5·1 answer
  • Which statement is true?
    5·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • The Internet began when a large company wanted to sell products online. <br> True or flase?
    6·2 answers
  • Where are the results from the Advanced Find feature displayed?
    6·1 answer
  • How will Artificial Intelligence change the way we do things? .......C-Claim:
    10·1 answer
  • When you check your hard drive to see how much space is available, you are checking your
    15·1 answer
  • WILL GIVE BRAINLIEST!!!!!! 10 POINTS!!!!
    14·2 answers
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!