1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?
Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

In organization security on information is the most important concern.  The police to drafted or made and dully signed by both employee and employer not to share the information to shared such as a password or any file to the outside world.

<u>Explanation:</u>

1. Share the network access password to an unauthorized person to access.

2. Sharing the workstation or desktop or laptop login password or file sharing outside the world to be avoided.

3. In any person not following and brought to notices and take necessary action and terminate the employee from the organization.

You might be interested in
What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?
Natasha2012 [34]

Explanation:

software must be used by well trained staff.

6 0
2 years ago
Describe how electrons move between atoms to create electricity.
pentagon [3]
Applying potential difference to a conductor, by potential force, free electrons gain energy and move from low to high potential. Thus, electrons move from one atom to another.
3 0
3 years ago
Read 2 more answers
URLs are the global ______ of resources on the Internet.
adell [148]
I believe the answer might be addresses 
 <span />
4 0
3 years ago
Read 2 more answers
Which sequence represents the hierarchy of terms, from smallest to greatest?
Anni [7]

Answer:

b

Explanation:

7 0
3 years ago
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Lapatulllka [165]

Answer:

An employee is having trouble opening a file on a computer.

  • → ✔ <u>information services and support</u>

The president of a company wants to give the company website a fresh new look.

  • → ✔ <u>interactive media</u>

An employee wants to work from home but can’t connect to the network from there.

  • → ✔ <u>network systems administration</u>

The vice president of sales would like help designing a new software program to keep track of sales.

  • → ✔<u> programming and software development</u>

<u>OAmalOHopeO</u>

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • ​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.
    14·1 answer
  • Why should you thank the customer after resolving an issue?
    7·2 answers
  • An electronic spreadsheet is a type of<br> archive.<br> database.<br> document.<br> periodical.
    15·2 answers
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • Suppose the fixed width of an aside element in a fixed layout is 300 pixels, and the fixed width of its parent element (body) is
    15·1 answer
  • Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do
    9·1 answer
  • Explain the term game! And give me complete sentences. U can use ur opinion as well!
    11·1 answer
  • D State Six Impact of ICT the society​
    7·1 answer
  • What is cache memory?Mention its importance. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!