1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
11

. The first step in devising security services and mechanisms is to develop a security policy True False

Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
5 0

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

You might be interested in
Select the correct answer.
snow_tiger [21]

Answer: I think it's D.

Explanation: I'm sorry if I chose the wrong answer, I'm not too good with stuff like this.

3 0
2 years ago
Bruno took the computer that he uses at work, and Pauline sits on the beach with her laptop computer, which she connects to the
Anika [276]

Answer:

Mobile Hotspot

Explanation:

using Mobile Hotspot you can connect to the internet using mobile data.

For this to work you should turn off the Wi-Fi in your mobile if any. We can connect more than one device using mobile hotspot

4 0
3 years ago
Early computers took up entire rooms. Which of these dramatically reduced the size of computers?
julsineya [31]
The answer is Microchips
4 0
3 years ago
Read 2 more answers
Can 7Cs help to develope an effective document?
zvonat [6]

Answer:

i dont know k srry

Explanation:

8 0
3 years ago
In this unit, you learned how to manipulate numbers and strings, acquire input from the user, perform data manipulations for var
e-lub [12.9K]

Answer:

Sometimes you will tell the CPU to use the main memory, secondary memory, network, or the input/output devices. Digital Computing: It's All ...

4 0
3 years ago
Other questions:
  • PHOTOGRAPHY
    15·2 answers
  • An assembly line is an example of which of the following facility layouts?
    8·1 answer
  • Threads in the ____ are idle, pending availability of a cpu.
    5·1 answer
  • According to the Big Five Factors model, all but _____ are categories.
    11·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    9·1 answer
  • Which statement describes a characteristic of SRAM in a PC?
    12·1 answer
  • Study the sentence below
    13·2 answers
  • What is meant by usability and what characteristics of an interface are used to assess a system’s usability?
    15·1 answer
  • Who is the first British in Europe ​
    10·1 answer
  • Write a C++ program that creates a map containing course numbers and the room numbers of the rooms where the courses meet. The d
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!