1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
6

The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use

r log-in screen. B. the amount and type of security placed on an application. C. the naming conventions applied to programs. D. scheduling of vacation and time off.
Computers and Technology
1 answer:
monitta3 years ago
4 0

I'd say B: the amount and type of security placed on an application.

This is a common problem that exists between IT and other user departments. The IT department is well known for closing up certain sites and applications needed by other departments all in the name of security. As a result, it might slow down operations within different department and may cause inefficiency.

You might be interested in
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
Natasha2012 [34]

Answer:

share level security model not required password for file share

Explanation:

The Common Internet File System ( CIFS ) formerly name is ( SMB ) a server message block    

it is develop by IBM and Intel for message based protocol

and there are 2 type authentication that are share level and user level

and in share level connection not required authentication

so its share level security model not required password for file share

 

7 0
3 years ago
Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
charle [14.2K]

Answer:

b. High-end CPU, lots of RAM, and high-end graphics card

Explanation:

Based on the information provided within the question it can be said that the priorities that would best benefit Mykel would be first high-end cpu, ram,  and then high-end graphics card. This is because the cpu and ram will allow Mykel to speed up his processing speeds which will allow for a smoother time when running multiple VM's while developing software. Then the high end graphics card will allow him to play the nest and most graphical intense games out there.

4 0
3 years ago
____ is the code of acceptable behaviors users should follow while on the internet; that is, it is the conduct expected of indiv
andriy [413]
The Computer Fraud and Abuse Act.
7 0
3 years ago
In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
leonid [27]

Answer:

Option A(True) is the correct answer for the above question.

Explanation:

  • The flowchart is used to give the solution of a problem through the diagram in a step by step processor. It helps the user to understand the solution easily. For diagram, it uses many types of symbols that are fixed for every sequence just like An oval symbol represents the start and end of the flowchart which is fixed for every flowchart.
  • So for the decisions in a flowchart, the diamond symbol is used which is to make the decisions and it has two sides-- one is true and the other is false.
  • The decisions are used also to represent the loop structure which is also called the repetition structure because the loop is controlled by the help of decisions so the diamond box is also used for the loop
  • The above question-statement says that the decisions-controlled is used for the loop and for the decisions which are true because it is also described above.
8 0
3 years ago
You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
ki77a [65]
Could be anything?
Maybe you get an email from them on their PC, which means they have internet
8 0
2 years ago
Other questions:
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • Steps in the systems development life cycle​
    15·2 answers
  • Self-confidence, blank, and communication are key factors to building positive relationships. Fill in the blank with a 13 letter
    5·1 answer
  • Please help me ASAP! Here is the question.
    15·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
  • a bus is full of passengers. if you count them by either twos, threes, or fives, there is one left. if you count them by seven t
    10·1 answer
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • Define the term visual as used in visual programming
    9·1 answer
  • How can a classroom be more effective by the use of multimedia? ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!