1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
11

What OS is most commonly used by businesses?

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
8 0
Businesses commonly use windows as their OS
You might be interested in
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Write a pyhton program to calculate area of a circle?
marta [7]

Answer:

The code to calculate the area of a circle is:

from math import pi

def circleArea(radius):

 if radius > 0:

   return pi * (radius ** 2)

 else:

   return None

if __name__ == '__main__':

 radius = 5

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

Explanation:

A detailed explanation of each line of code is given below.

#Define the number pi used to calculate the area

from math import pi

#We define a function that calculates the area of a circle

def circleArea(radius):

#Check if the radius is valid ( radius > 0) since there aren´t negative radius

 if radius > 0:

#Compute the area formula for a circle \pi * radius^{2}

   return pi * (radius ** 2)

 else:

#Return None if the radius is invalid

   return None

#Run the function we´ve defined

if __name__ == '__main__':

#Define a radius

 radius = 5

#Call the function and parse the radius through it, then print the result

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

8 0
3 years ago
Cleo received a message from Joline that was sent to her as well as two other coworkers named Sam and Thomas. Cleo
babymother [125]

Answer:

Cleo would choose the option "Forward"

Explanation:

Reply means reply to a single person

Reply All means to reply to the entire thread

Forward means to send the email to another

Copy means to copy the email, but it doesn't send

7 0
3 years ago
Read 2 more answers
Pls help its not school work i just need this fixed
Bingel [31]

Answer:

This just means that you have no file in your computer named 'Requirments' hence it is not able to retrieve any data from there.

6 0
2 years ago
Choose the word that best completes this sentence. Caught-in and caught-between injuries result from a person being squeezed, ca
loris [4]
I do not know, i really hope you dont fail!!!!!!!!!
8 0
3 years ago
Read 2 more answers
Other questions:
  • What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manu
    9·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • What era was the metalwork from
    10·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    15·1 answer
  • Learning how to use word processing and spreadsheets, and creating presentations are all considered __________ computer skills.
    15·2 answers
  • If anyone has the answer for this that would be really helpful!!
    8·2 answers
  • Can someone help me on a 60 second ringtone :(
    9·1 answer
  • What is the function of ROM?
    10·1 answer
  • How does a Cloud-first strategy approach a client's migration to the Cloud?by removing outside ecosystem partners from the Cloud
    14·1 answer
  • What should the Dhruv consider when connecting to the Internet in a public place? Select all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!