Answer:
5
Explanation:
A rebuttal brings the reader back to their side of the argument.
D. “We decided to go to the pool.”
A sounds weird, B is incomplete, and C has random periods, leaving D
This gives no hints but my guess will be a bank of bankers
Elizabeth should block end users from;
- installing software and or
- changing system configurations on their own machine.
<h3>Who are end users in computer science?</h3>
End users in computer science refers to the people who use Information Technology products in an organization.
<h3>What is a security policy in computer science?</h3>
The objectives and components of a company's computer systems are specified in its computer security policy.
Both extremely formal and casual definitions are acceptable. Organizational rules or security measures are used to enforce security regulations.
How a computer system is implemented technically determines whether it is secure or not.
Learn more about security policies:
brainly.com/question/4996925
#SPJ1