1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
4 years ago
6

"identify the technology that lets a company rent space on a remote computer system and use the system's software to manage its

human resource activities, including security and upgrades."
Computers and Technology
1 answer:
yulyashka [42]4 years ago
4 0

The answer is ASP. ASP is also an abbreviation for Active Server Page. An Application Service Provider (ASP) is a company that offers individuals or enterprises access over the Internet to applications and related services that would otherwise have to be located in their own personal or enterprise computers.

You might be interested in
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
4 years ago
Really desperate!
bija089 [108]

Answer: Sorry to break this to you but you can't.

Explanation:

7 0
3 years ago
Read 2 more answers
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
_ is the adherence to a personal code of principles.
trapecia [35]

Answer: Ethics

Explanation:

 Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.

The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.

Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.  

3 0
4 years ago
Marx and engels identified two social classes: the ______ who possess the means of production and ______ who must do all the wor
Morgarella [4.7K]

Marx and Engels identified two social classes: the exploiters who possess the means of production and exploited  who must do all the work.

<h3>What is a Social class?</h3>

A social class is known to be a kind of a grouping of people and it is one that is made where people are said to be shared into a set of hierarchical social stages  or groups.

Note that the most common are the upper, middle and lower classes. Membership in a social class is seen to be based on  or dependent on education, wealth, occupation, and others.

Hence, Marx and Engels identified two social classes: the exploiterswho possess the means of production and exploited  who must do all the work.

Learn more about social classes from

brainly.com/question/1065123

#SPJ1

8 0
2 years ago
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?
    9·2 answers
  • What does CTR stand for?
    10·2 answers
  • Write down a recurrence relation for this version of QuickSort, and solve it asymp-totically. Show your work. Assume that the ti
    13·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • What is the differnce between ''P4 and 4P''
    12·2 answers
  • In terms of system thinking, what is process?
    15·2 answers
  • You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y
    7·1 answer
  • When activated, an Excel object has all the features of an Excel ______?
    9·2 answers
  • As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is inst
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!