1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
5

Yolanda is writing a document that will provide configuration information regarding the minimum level of security that every sys

tem in the organization must meet. What type of document is she preparing?
Computers and Technology
1 answer:
Leviafan [203]3 years ago
5 0

Answer:

The answer is "Baseline document".

Explanation:

Yolanda prepares the Baseline document, in which each system shows in all its organization, that must satisfy a minimum level of security. This document is used to define as an official document, which has a from a first document.

  • It is also known as the process of authorization and certification as intended to be used.  
  • This document is also known as a transition or reworking the certain files which have been approved formally.
You might be interested in
Why would a user want to compress a large file before sending it as an email attachment?
Afina-wow [57]

to reduce the file size of the attachment

7 0
3 years ago
Read 2 more answers
Vivek wants to save the data about his grocery store in a single table. Which among the following type of databases is used in t
Orlov [11]

Explanation:

A centralized database (sometimes abbreviated CDB) is a database that is located, stored, and maintained in a single location.

4 0
3 years ago
Which of the following statements is/are true? (Points : 5) A. A default constructor is automatically created for you if you do
snow_lady [41]

Answer: Only A and C

Explanation: Default constructor is a constructor that has parameters with the values that are default or has no arguments/parameter present. Default constructor is not declared in the class rather it gets generated by itself when not defined.

Class is defined with data members, functions, objects etc are considered as per the requirement given by the user .It is the user defined concept.

Statement (B) is incorrect because static method is used for accessing the static members of the particular class and manipulate the value of it.

Thus, only statement (A) and (C) are correct.

6 0
3 years ago
How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
Nadya [2.5K]
<span>There should be no need to have white-collar employers just next to factories thanks to the Information Revolution, and it enabled executives to stay in home, write documents, and send them easily.</span>
4 0
4 years ago
Package Newton’s method for approximating square roots (Case Study: Approximating Square Roots) in a function named newton. This
lutik1710 [3]
I’m confused what are you asking
7 0
3 years ago
Other questions:
  • You can drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and then draggi
    9·2 answers
  • Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
    9·1 answer
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsExc
    13·1 answer
  • Write a calculator program that will allow only addition, subtraction, multiplication &amp; division. Have the
    7·1 answer
  • What might be some challenges if you’re trying to design a product for someone
    14·2 answers
  • To break a text string into several lines, which means that the text string continues on the next line, the _____ character shou
    8·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
  • Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to sca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!