1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
3 years ago
15

What is your perception of what a safe classroom looks like

Computers and Technology
1 answer:
Andreyy893 years ago
6 0

Answer:

6 feet apart

Explanation:

You might be interested in
Does anyone play fortnite i want to be gifted vbucks please my epic is Springtrap_locks thx means a lot to me
Paladinen [302]

Answer:

This is not what this platform is supposed to be used for

Explanation:

Fortnite isnt a real game lol get a life

3 0
3 years ago
Why can't I post a math question (here on brainly)? It just keeps loading it's been almost an hour.
liubo4ka [24]

Answer:

have you tried establishing a secure network?

Explanation:

8 0
2 years ago
Read 2 more answers
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
_____data becomes part of your destination file and remains static even if the source data change
labwork [276]
I believe it is linked. linked data can become a part of the destination file but it alsoremains connected to the source file.

https://officepowerusers.weebly.com/linking-and-embedded-between-excel-and-other-programs.html

check this out to see what you get out of it.
6 0
3 years ago
Read 2 more answers
Spoken word and written text are different because?
Dahasolnce [82]
There are several differences between spoken words and written texts, among these differences are the following:
1- Spoken words have tones that show the feelings of the speaker, whereas, the written text is expressionless.
2- Spoken works might have inaccurate grammar or sentence structure, whereas, the written text has correct syntax and perfect grammar
3- Written text has a sort of a standard form that can be understood by anyone who speaks the language that the text is written in, regardless the dialect or the accent.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Name some of the file extensions for images and provide more information about one or two of them.
    12·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
    10·2 answers
  • A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
    6·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • NoSQL is a programming language used to create mobile apps.<br> a) True<br> b) False
    13·2 answers
  • Please help it’s timed
    5·1 answer
  • Please answer this now I need please.
    5·1 answer
  • Which statement correctly describes the difference between an IP address and a MAC address for a
    14·1 answer
  • 30 POINTS FOT THE ANSWER FAST
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!