1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
4 years ago
7

The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre

ate a framework based on its own needs. Frameworks like ISO and COBIT are resources and should not be used as models to build on
Computers and Technology
1 answer:
Valentin [98]4 years ago
6 0

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

You might be interested in
HELP MY TABLET KEEPS ON REBOOTING I TRIED TO FACTORY RESET BUT IT KEEPS ON REBOOTING
vesna_86 [32]

Answer: try to restart It

Explanation:Random reboots can happen because of problems with the firmware, but can also be due to some app you installed that is making the system unstable, or perhaps some bad bit of data that is in the system cache. A corrupt SD card can also cause problems.

6 0
3 years ago
Read 2 more answers
Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?
nadezda [96]
The answer is A) Double.

The return type is specified before the method's signature, and the signature is composed of the the method's name and parameters.

In this case, the method is named mynewFunction, takes in an integer as a parameter, and returns a double.

Also, fun fact which is kind of unrelated: if two or more methods have the same name, they can have different functionality as long as their signature is different (different parameter types).
3 0
3 years ago
Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
nika2105 [10]

Kernal is the core of an operating system that maintains the computer’s clock, starts applications, and assigns the computer’s resources, such as devices, programs, apps, data, and information.

d. kernal.

<u>Explanation:</u>

Every operating system runs the operating system based on kernel instructions. Main or major role of operating system is kernel. If boot loader program fails to load kernel operation is missing the kernel we need to reinstall operating system or repair the operating system.

To display clock in the workstation or laptop or desktop, clock device driver been executed by kernel of operating system.

Kernel is core of any operating system, but kernel also controlled by operating system such as Unix etc.

3 0
3 years ago
The picture that graphically since the items you use in windows is called
katrin2010 [14]
Flip board or in some cases it is called a life at a glance
5 0
3 years ago
What are 6 subtopics on computer programming ?
lubasha [3.4K]

On the internet, I found

Research topics

Artificial Intelligence

Computing and Mathematics

Cybersecurity

Data Science and Machine Learning

Embedded Systems and IoT

Process Management

Hope this helped :T

3 0
3 years ago
Other questions:
  • 8 POINTS!!!!!!!!
    6·2 answers
  • What is the accounting equation?
    12·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • g 'write a function that takes as input a list and outs a new list containing all elements from the input
    5·1 answer
  • I need help picture above
    15·2 answers
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!