1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
7

It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu

rity experts and from business-focused managers in each community of interest when making revisions to security policies.
Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
7 0

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

You might be interested in
Assuming 8-bit 2's complement notation, what is the result of subtracting 00001001 from 00001101?
iVinArrow [24]
I think this is how it's done ;)

6 0
3 years ago
In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
Anni [7]

Answer:

Internet Protocol refers to a set of rules that govern how data packets are transmitted over a network. Internet protocol describes how data packets move through a network. Its important to have agreed upon protocols because Computers make use of protocols as well, to enable them to communicate. Devices need to communicate. When two devices want to successfully communicate, they must agree to follow some rules about the way they will do it.

8 0
3 years ago
Applications of the e-government​
vodka [1.7K]

Answer:

Elections

Explanation:

This is because the applications helps citizens to carry out legal elections without stress of moving long distances and it helps keeps votes secret coz of personal view of the data entry

5 0
3 years ago
Read 2 more answers
What online resource would you use if you wanted to read a review about a new movie?
Vilka [71]

Answer:

fdgf

Explanation:

fdgdfg

5 0
2 years ago
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS serve
tatuchka [14]

Answer:

nslookup ifconfig.

Explanation:

The nslookup is used a number of times by network admins to troubleshoot DNS related problems. In addition, this command finds IP addresses and name servers of hosts. This utility command queries the DNS database tables from every host in a network. It then determines the host name and issues an IP. It sort of converts your domain name into an IP addresses. This command combined with ifconfig finds the correct DNS servers and assigns the correct DNS server IP.

6 0
3 years ago
Other questions:
  • Need Help !!! Please
    8·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • The page orientation in which the page width is greater than the page height is called
    8·1 answer
  • What does the CPU do in a computer?
    7·2 answers
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • How do entrepreneurs traditionally use computers? check all of the boxes that apply.​
    13·2 answers
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Would it be feasible to combine fixed length field and variable length field format in single disk
    15·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!