1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
7

It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu

rity experts and from business-focused managers in each community of interest when making revisions to security policies.
Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
7 0

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

You might be interested in
Which Traffic Source dimensions does Google Analytics automatically capture for each user who comes to your site?A. Source, Keyw
LenaWriter [7]

For each user who comes to your site the google analytics automatically capture the traffic source dimensions Source, Medium, Campaign name.

<u>Explanation:</u>

Source:

  • There cannot be any reference to a website without an origin source.
  • The source is basically the origin of your traffic such as a search engine (google) or a domain (ex: Twitter).

Medium:

  • Every referral to a website also has a medium along with the source.
  • examples are -:  unpaid search, "cost per click", referral, mail.

Campaign name:

  • The campaign Name is the name referring to the google ads campaign.
5 0
4 years ago
How are radio waves used on Earth?
kicyunya [14]

Uses of Radio Waves : The prime purpose of radio is to convey information from one place to another through the intervening media (i.e., air, space, nonconducting materials) without wires. Besides being used for transmitting sound and television signals, radio is used for the transmission of data in coded form.

8 0
3 years ago
If you click the Increase Font Size button too many times and make the font size too big, you can click the ____ button until th
bagirrra123 [75]

Answer:

Decrease Font Size.

Explanation:

If the font size becomes too big by repeatedly clicking too many times Increase Font Size.So to decrease the font size you should click on the decrease font size until the size becomes desirable. Decrease font size as the name suggests is used to decrease the size of the font.So the answer is Decrease font size.

3 0
3 years ago
What is the best use of a line chart? to show parts of a whole while emphasizing specific data to compare and contrast discrete
garri49 [273]
<span>The correct answer is:</span> to display data that changes over time

 

A line chart is a basic type of chart used in many fields. It is usually denoted by ‘markers’ connected by ‘lines’ and it visualizes a trend, most commonly, changes over a period of time of a certain data.

8 0
4 years ago
Read 2 more answers
When designing a kernel with rudimentary functionality, what are the required services? Justify your answer and provide an examp
kykrilka [37]

Explanation:

Kernel is the program that is used as the first software program to connect with the hardware devices of the system. Rudimentary functions provides limited functions when the Kernel is designed with it to provide primary services to the system.

The major services required for such design are as follows :-

  • Presence primary interrupt function
  • Requires RAM for the memory space
  • Primary services scheduling
  • Citing the kernel using Bootstrap program

E.g.- By turning-on the computer system, the first program to get already loaded from disk to memory space is the Bootstrap program .Then the device is ready and can be used for calling the external program.

5 0
3 years ago
Other questions:
  • Human-centered technology often recommends _______ao
    13·2 answers
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • Explain The Two Way Communication in full.
    10·1 answer
  • What is a left hand door lever?
    13·2 answers
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • Why is printer an output device​
    14·2 answers
  • HELP!!!!!
    7·1 answer
  • I need help with this answer, I will give brainliest as long as there is actually an answer!
    11·1 answer
  • Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the use
    7·1 answer
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!