1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
6

which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi

nts
Computers and Technology
1 answer:
Vladimir79 [104]3 years ago
7 0
A) There are inappropriate and appropriate places to visit.

Hope this helps! <span />
You might be interested in
When you adopt a certain framework or strategy for solving a series of problems, you may fail to see other, more efficient ways
Olegator [25]
I believe it is called closed mindset. Closed mindset is when you fail to see other ways to your error and don't accept help or think you can improve.
7 0
4 years ago
To make your brand colors stand out, it is important to implement what with your color scheme?
qaws [65]

Answer:

All of the above

Explanation:

It's better to have a pattern of colors than one single color in you color scheme.

6 0
3 years ago
Read 2 more answers
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
A single central register of IP addresses and names (a DNS style system) is an efficient means of translating human readable nam
Harrizon [31]

Answer:

True

Explanation:

DNS stands for "Domain Name System" DNS is the system/service that is used to convert the Domain Names into IP addresses.

Whenever we write a URL to go to a web page in our browser for example Brainly(dot)com, the request first goes to a server which converts the named URL(Brainly(dot)com) into actual IP address. This actual IP address is then used to reach to the web files, as response to the URL search. This system is made to ease out the searches made by the users.

Therefore, the given statement is True.

8 0
4 years ago
Jim has listed stages of the product life cycle in his presentation. Which slide element can Jim use to make the items in the li
Sergeeva-Olga [200]
I believe the correct answer is C.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • PLEASE PLEASE PLEASE PLEASE HELP!!! I REALLY NEED HELP AND ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·1 answer
  • The Sentence below me is true. <br><br><br> The Sentence above me is false
    13·1 answer
  • Network in which every computer is capable of playing the role of the client, server or both at the same time is called *
    6·1 answer
  • Que quiere decir analogico
    6·1 answer
  • Why is it important to ensure that your software is up to date?
    13·1 answer
  • Lyla is writing a program that uses a recursive method. Why might she want to use a recursive helper method?
    8·1 answer
  • Java Eclipse homework. I need help coding this|
    10·1 answer
  • Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?
    6·1 answer
  • What are web site and web page?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!