1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
7

It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu

rity experts and from business-focused managers in each community of interest when making revisions to security policies.
Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
7 0

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

You might be interested in
A program that will ring a bell six times is what kind of program?
amm1812

Answer:

D

Explanation:

because it is a sequence it does more than one thing

6 0
3 years ago
Read 2 more answers
How long does a baby dolphin stay with its mum
g100num [7]
The nursing usually takes up to 18 months, i.e. one year and a half.

The baby dolphin may however remain with his mum for up to 3-6 years.
5 0
3 years ago
Therapeutic services pays less than most other careers.<br><br><br> 1) True<br> 2) False
horrorfan [7]

This is false. Therapeutic services are some of the most expensive.

6 0
3 years ago
Read 2 more answers
Each wireless network has its own name to identify it, known as service set identity. true false
Dominik [7]
True. The acronym for service set identity is SSID, which you've likely saw before. And like you say, it's simply the unique name given to a wireless network so that we are able to identify what network we are connecting to.
8 0
3 years ago
How to keep tools and equipment safeuh​
ivanzaharov [21]

Answer:

Use pelican, or similar heavy duty cases

Explanation:

Pelican is a brand btw. 10/10 would recommend

8 0
3 years ago
Read 2 more answers
Other questions:
  • A web page that integrates content and scripts from multiple web sites to create new applications is known as a:
    13·1 answer
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • Which of the following statements is false?
    12·1 answer
  • Which if the following ribbons in Microsoft word is used to add tables and images
    14·1 answer
  • Insert a row above the selected row (in between row 1 and row 2).
    15·2 answers
  • What is the difference between C and C++. If I know C, will it be hard to lean C++?
    15·1 answer
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • 12. When computer professionals take on jobs, they may not enter into relationships with which of the
    6·1 answer
  • A website for a certain political party or candidate is likely to have unbiased
    6·1 answer
  • Los organos de los sentidos perciben de la misma manera un estimulo?porque?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!