1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?
Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

In organization security on information is the most important concern.  The police to drafted or made and dully signed by both employee and employer not to share the information to shared such as a password or any file to the outside world.

<u>Explanation:</u>

1. Share the network access password to an unauthorized person to access.

2. Sharing the workstation or desktop or laptop login password or file sharing outside the world to be avoided.

3. In any person not following and brought to notices and take necessary action and terminate the employee from the organization.

You might be interested in
Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
daser333 [38]

Answer:

Time taken to travel from one track to the next = 0.08ms

Initial track= 15     0

4      (15-4)*(0.08)= 0.88

40     (40-4)*(0.08)= 2.88

35      (40-35)*(0.08)= 0.4

11       (35-11)*(0.08)= 1.92

14       (14-11)*(0.08)= 0.24

7         (14-7)*(0.08)= 0.56

----------------------------------------------

Total seek time=0.88+2.88+0.4+1.92+0.24+0.56=6.88ms

Explanation:

We caculate the seek time for each request, and then add them together to find the total seek time. The final track number for the current request becomes the current track of next request, and this process is repeated till the last request is processed.

4 0
3 years ago
NOS stands for _____.
Andre45 [30]

there are different ones like

Not Otherwise Specified

Network Operating System

5 0
3 years ago
Match the definition with the corresponding word
Oksana_A [137]

Answer:

Ram is your memory

that's all i know

4 0
3 years ago
Read 2 more answers
Acme Widgets currently uses a 1024-bit RSA encryption standard company wide. The company plans to convert from RSA to an ellipti
nadya68 [22]

Answer:

The answer is "Option A".

Explanation:

The elliptical curve cryptography system needs much shorter keys for cryptography, and it is very powerful because of the RSA cryptography method. It is also known as a key of 1024-bit, which is in comparison is equal to the 160-bit ECC key for cryptographic, that's why other options are not correct, which is defined as follows:

  • In option B,  It is higher the ECC key system, that's why it's wrong.
  • In option C, It is a part of the RSA system but its value doesn't match the ECC system, that's why it is wrong.  
  • In option D, It's valued is just double to the RSA system, that's why it is wrong.

6 0
2 years ago
What do you call the ability to use the internet
Alchen [17]

Answer:I call it life

Explanation:Without it I’m dead

5 0
3 years ago
Other questions:
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    8·2 answers
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    7·2 answers
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • Assume you previously entered these lines of code.
    14·2 answers
  • Which increases the rate of soil formation?
    10·1 answer
  • Why do you think you are ready to handle the high school type of education and atmosphere? (in complete sentences)​
    11·1 answer
  • Dynamic addressing: __________.
    12·2 answers
  • If a student passes off an author’s work as his or her own, the student has
    6·1 answer
  • Qr code is more developed than barcode​
    11·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!