1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
9

Most of us use road blocks from time to time. Some common mistakes we make might include:_______. A. Not asking for clarificatio

n when you know you don't understand what is being said. B. Smiling even though you are really upset. C. Assuming you know what is going to be said. D. All of the above.
Social Studies
1 answer:
vagabundo [1.1K]3 years ago
6 0

Answer:

D. All of the above.

Explanation:

Most of us use road blocks from time to time. There are many types of roadblocks that an individual may use in different situations some some of the more common mistakes being, not asking for clarification when you know you don't understand what is being said, smiling even though you are really upset., or even assuming you know what is going to be said.

You might be interested in
Which is a bioswale designed to filter
seraphim [82]
Bioswales are landscape elements designed to concentrate or remove silt and pollution from surface runoff water.
8 0
3 years ago
Read 2 more answers
NIST Special Publication 800-18 Rev. 1, The Guide for Developing Security Plans for Federal Information Systems, includes templa
Arlecino [84]

Answer:

<u><em>The answer is</em></u>: <u>True.</u>

Explanation:

<u>Information System Security Plan Template </u>

<u>Guide for Developing Security Plans for Federal Information Systems </u>

1. Information System Name/Title:

• Unique identifier and name given to the system.

2. Information System Categorization:

• Identify the appropriate FIPS 199 categorization.

LOW MODERATE HIGH

3. Information System Owner:

• Name, title, agency, address, email address, and phone number of person who

owns the system.

4. Authorizing Official:

• Name, title, agency, address, email address, and phone number of the senior

management official designated as the authorizing official.

5. Other Designated Contacts:

• List other key personnel, if applicable; include their title, address, email address,

and phone number.

6. Assignment of Security Responsibility:

• Name, title, address, email address, and phone number of person who is

responsible for the security of the system.

7. Information System Operational Status:  

• Indicate the operational status of the system. If more than one status is selected,

list which part of the system is covered under each status.

Operational Under

Development

Major

Modification

8. Information System Type:

• Indicate if the system is a major application or a general support system. If the

system contains minor applications, list them in Section 9. General System

Description/Purpose.

Major

Application

General Support  

System

9. General System Description/Purpose

• Describe the function or purpose of the system and the information processes.

10. System Environment

• Provide a general description of the technical system. Include the primary  hardware, software, and communications equipment.

11. System Interconnections/Information Sharing

• List interconnected systems and system identifiers (if appropriate), provide the  system, name, organization, system type (major application or general support  system), indicate if there is an ISA/MOU/MOA on file, date of agreement to  interconnect, FIPS 199 category, C&A status, and the name of the authorizing  official.

System

Name

Organization Type Agreement

(ISA/MOU/MOA)

Date FIPS 199

Category

C&A  

Status

Auth.

Official

12. Related Laws/Regulations/Policies

• List any laws or regulations that establish specific requirements for the

confidentiality, integrity, or availability of the data in the system.

13. Minimum Security Controls

Select the appropriate minimum security control baseline (low-, moderate-, high-impact)  from NIST SP 800-53, then provide a thorough description of how all the minimum  security controls in the applicable baseline are being implemented or planned to be  implemented. The description should contain: 1) the security control title; 2) how the  security control is being implemented or planned to be implemented; 3) any scoping  guidance that has been applied and what type of consideration; and 4) indicate if the  security control is a common control and who is responsible for its implementation.

14. Information System Security Plan Completion Date: _____________________

• Enter the completion date of the plan.

15. Information System Security Plan Approval Date: _______________________

• Enter the date the system security plan was approved and indicate if the approval

documentation is attached or on file.  

<u> The following sample has been provided ONLY as one example</u>. Agencies may be using other formats and choose to update those to reflect any existing omissions based on this guidance. This is not a mandatory format; it is recognized that numerous agencies and information security service providers may have developed and implemented various approaches for information system security plan development and presentation to suit their own needs for flexibility.  

<u><em>The answer is</em></u>: <u>True.</u>

4 0
3 years ago
The idea that technology can help older adults have more control over their circumstances, interact with others more frequently,
Mila [183]
I think it’s The e-quality theory of aging, but I may be wrong. Hope this helps!
8 0
3 years ago
Don’t mind this lol take my points by answering
loris [4]

Answer:

Thank you but someone may report and delete this question

Explanation:

5 0
2 years ago
A relationship between instances of two entity types is a:
ryzh [129]
E - Binary.
Unary refers to single and ternary refers to triplicate. Binary refers to a duo or pair.
5 0
3 years ago
Other questions:
  • The word _____ comes from the greek word meaning to throw together.
    10·1 answer
  • Why was the southwest a likely place for the Spanish to explore
    14·1 answer
  • Antonia is a psychology graduate student who just learned how to administer and score another projective test. This one has blac
    10·1 answer
  • How did the colonists protest this law in the stamp act in 1765
    12·1 answer
  • John has been transferred to an office in Japan for a year. In his first few weeks, he began to feel confused and rejected as we
    12·1 answer
  • Question 18
    8·1 answer
  • Describe the relationship between Britain and the US during the war
    13·1 answer
  • Which must be kept in mind when determining if an explanation is correct? 1. whether people reading the explanation agree 2.the
    5·2 answers
  • When the Republican Party formed, what was its primary goal?
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!