1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?
Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

In organization security on information is the most important concern.  The police to drafted or made and dully signed by both employee and employer not to share the information to shared such as a password or any file to the outside world.

<u>Explanation:</u>

1. Share the network access password to an unauthorized person to access.

2. Sharing the workstation or desktop or laptop login password or file sharing outside the world to be avoided.

3. In any person not following and brought to notices and take necessary action and terminate the employee from the organization.

You might be interested in
Explain the characteristics of 1st generation computers​
levacccp [35]

Explanation:

i hope this is the right answer

!st generation computers were more big and bulky and you for sure could not bring them around everywhere.

8 0
3 years ago
Answer this blank:<br><br> Air enters through the mouth or nose, and travels through the _
Schach [20]
Respiratory system ?. Or esophagus?
5 0
3 years ago
Read 2 more answers
Selena needs to insert a comment in a webpage's code to ensure that other web team members who work with the page code understan
ANTONII [103]

Answer:

<!-- Modified by selena ramirez - for html compliance -->

Explanation:

In HTML, <!-- .. --> tag is used to insert comments in the webpage code.

Comments written inside the tag is visible only on the code, and is not displayed in the browsers when the page is requested by the client computer.

<em>Comment tag</em> is useful when there is a lot of code and multiple developers are dealing with the same code.

Comments help developers understand what changed is made and why.

5 0
3 years ago
Advantages of a computer​
Bess [88]

Answer:

It eases work.

It is deligent.

It is versatile.

8 0
3 years ago
__________(fill in the blank) in online education refer(s) to how online education impacts students of a specific economic group
amid [387]

Answer:

I believe it's accessibility

Explanation:

Because it makes the most sense

7 0
2 years ago
Other questions:
  • When programming in Scratch, to make our Sprite walk across the background, in which category would we find the programming bloc
    7·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • Naruto Uzumaki who likes naruto ??? who waches it??
    14·2 answers
  • Apex
    5·2 answers
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • Please help ASAP!
    7·2 answers
  • I'm bad i'm mrs puff doo doo doo yeah it's a holiday
    6·2 answers
  • Please help me asapppp!​
    8·2 answers
  • Is it true that if the user log out the computer will turn off automatically​
    9·2 answers
  • What does the word collaborative mean?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!