1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
3 years ago
12

Information contained on devices is protected by three layers: two of the layers are products and policies and procedures. what

is the third layer?
Computers and Technology
1 answer:
Elza [17]3 years ago
4 0

I believe the correct answer is people

Infοrmatiοn (cοntainеd οn thе dеvicеs) is prοtеctеd by thrее layеrs: prοducts, pеοplе, and pοliciеs and prοcеdurеs.


You might be interested in
Jacob would like to include an arrow in his newsletter to point to some important information. He should _____.
qwelly [4]

Some people either add a shape as I do. But for this particular question it would be, either add word art or create a list with bullets. I would rather do word art or insert shape because that means you do not have to get the single bullet.


I really do hope this helped you. I hope you have a great day. And if I am incorrect I apologize.

3 0
3 years ago
Read 2 more answers
Please describe in a few sentences
myrzilka [38]

Because a theorie is someones scientific quess on a matter so soon they get a understanding and change them. They are not discarded because they usually keep the same wording but not all so that it is correct then.

:)

4 0
3 years ago
You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Interne
konstantin123 [22]

Answer:

From the user explanations, it can be inferred that the issue may be as a result of incorrect security parameters such as Wireless Protected Access (WPA) which ensure security for wireless connections.

Explanation:

If there is an incorrect access pass to the wireless network by the WPA, any wireless user will not be able to complete a Layer 2 connection to the wireless network after connecting and getting good signal indication and would thus be unable to obtain IP address automatically to be able to log on to browse the internet from the DHCP Server.

8 0
3 years ago
Read 2 more answers
1. Write a method isMultiple that determines, for a pair of integers, whether the second integer is a multiple of the first. The
zhannawk [14.2K]

Answer:

see explaination for code

Explanation:

Implement using JAVA

import java.util.Scanner;

public class Multiples {

public static boolean isMultiple(int first, int second){

if(second%first == 0)

return true;

else

return false;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

while(true){

System.out.print("Enter one number: ");

int first = sc.nextInt();

System.out.print("Enter a second number: ");

int second = sc.nextInt();

if(isMultiple(first, second))

System.out.println(second+" is multiple of "+first);

else

System.out.println(second+" is not multiple of "+first);

System.out.print("Do you want to enter another pair(y/n)? ");

char c = sc.next().charAt(0);

if('y' != Character.toLowerCase(c))

break;

}

}

}

/*

Sample run:

Enter one number: 7

Enter a second number: 28

28 is multiple of 7

Do you want to enter another pair(y/n)? y

Enter one number: 8

Enter a second number: 24

24 is multiple of 8

Do you want to enter another pair(y/n)? y

Enter one number: 4

Enter a second number: 2

2 is not multiple of 4

Do you want to enter another pair(y/n)? n

*/

8 0
3 years ago
Oliver wants to send a report to his boss discussing the upcoming project. Which communication facility would he use to send a f
vladimir2022 [97]
I pretty sure email
5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following sentences is written in the active voice
    12·2 answers
  • Which tool relies on the logged on user's certificate details to encrypt or decrypt files and folders? powershell bitlocker encr
    12·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • A(n ________ is information that is passed to a function, and a(n ________ is information that is received by a function.
    15·1 answer
  • If you're using your keyboard, what actions are you most likely performing in Access?
    15·2 answers
  • True/False: The American Standard Code for Information (ASCII) is a code that allows people to read information on a computer.
    9·2 answers
  • In 1997, microsoft was accused of using a monopoly in operating systems to control the market for _____.
    8·2 answers
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • What information is necessary to review in order to be considered familiar with the Safety Data Sheet (SDS) of a substance
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!