1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
2 years ago
7

It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu

rity experts and from business-focused managers in each community of interest when making revisions to security policies.
Computers and Technology
1 answer:
s2008m [1.1K]2 years ago
7 0

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

You might be interested in
What is ""quality""?
Naddik [55]

Answer: Quality is the parameter which describes about the distinctive trait  presented by something.The measurement of the quality is based on whether or not the substance is able to fulfill the requirement of the client.

In respect with the computing field ,quality is the characteristic that is supposed to be good if there is presence of no defects or damage and is able to meet the requirement of the user or client. This parameter can be for devices, programming languages, software etc.

7 0
3 years ago
Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv
omeli [17]

Answer:

Proxy Server

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request. This speeds up the delivery of resources to the users.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
The variables within the class all are related to help describe the object.
lawyer [7]
This does not make sense
3 0
3 years ago
3 things you will do while driving
tino4ka555 [31]

Umm..let’s see hold the steering week look at the road and look on my phone for directions

4 0
2 years ago
What tools can you use to delete active directory users?
8090 [49]
Hi,

Every operating system haves its own terminal.
If you are on a Windows computer open command prompt as administrator and you can delete user directory by typing.

"net user <username> /delete"

This will delete the user from the computer including his/her data.

Hopefully this will help.
r3t40
5 0
3 years ago
Other questions:
  • A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through
    13·1 answer
  • if there are several web pages that you visit regularly what can you do to make accessing them more efficient?
    13·1 answer
  • How to hard reset a iphone 7 without computer
    8·2 answers
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • Almost all application programs are designed to run with a specific platform. Group of answer choices True False
    15·1 answer
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • When you are almost done with your soup and want to get at the last little bit, how should you do this 2
    5·1 answer
  • Is it more costly to Andrew to go to graduate business school full time or part time if the tuition is the same for each? A. Par
    5·2 answers
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!