1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
4 years ago
11

A security policy is a

Computers and Technology
1 answer:
777dan777 [17]4 years ago
3 0

Answer:

D: set of rules based on standards and guidelines

Explanation:

You might be interested in
From an IT perspective, which of the following best describes BI and BI apps?
Natali5045456 [20]

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

4 0
3 years ago
The objective fuction of linear progrmming should be
Minchanka [31]
The real-valued function whose value is to be either minimized or maximized subject to the constraints defined on the given LPP over the set of feasible solutions. The objective function of a LPP is a linear function of the form z = ax + by.
4 0
2 years ago
How does the text recommend that a company operate if it wants to be successful in the information age?
Kryger [21]

Answer:

The answer is "Departmental interdependence".

Explanation:

In the given question some information is missing, that is an option, which can be described s follows:

A. Work independently across organizations.

B. Departmental interdependence.

C. As an individually small department or as a team.

D. Each organization functions as a separate business entity.

There are separate positions in each organization, but the departments can not actually interact with each other, in the hierarchical paradigm of interdependence and can not rely explicitly on each other, each division presents the same ultimate problem, and other choices were wrong, that is described as follows:

  • In option A, It is wrong because in the organization there are some protocol which will be followed by all.
  • Option C and Option D both are wrong because each organization's function is not separated by the business entity, and it is not small.
6 0
3 years ago
-Define three types of user mode to kernel mode transfers?
Ivahew [28]

Answer:

 The three types of user mode to the kernel mode transferred occurred due to the:

  • It is mainly occurred due to the interrupt when, it send to the central processing unit (CPU).
  • It also occurs due to the hardware exception and when the memory is access illegally as it is divided by the zero.
  • It is mainly implemented or executed by the trap instruction as the system are basically executed by the program.
7 0
3 years ago
What kind of negative social impact has wireless communications had on today's society?
Zarrin [17]
Kind of negative social impact has had today is debates on social networking and dating and wireless communications are destroying kids from ages 12-16 these 21st century devices are frying are worlds society.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Use blank to prevent friends who have been drinking from driving
    14·2 answers
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • Which describes which CTSO each student should join?]
    7·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • For which of the following careers is technology’s connectivity factor most important?
    13·2 answers
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • At the beginning of a chapter in a book, the first letter often appears larger than the other text on the page. This
    15·1 answer
  • What are the three basic classes of application
    14·2 answers
  • How to unsubscribe from Brainly
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!