1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?
Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

In organization security on information is the most important concern.  The police to drafted or made and dully signed by both employee and employer not to share the information to shared such as a password or any file to the outside world.

<u>Explanation:</u>

1. Share the network access password to an unauthorized person to access.

2. Sharing the workstation or desktop or laptop login password or file sharing outside the world to be avoided.

3. In any person not following and brought to notices and take necessary action and terminate the employee from the organization.

You might be interested in
Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
nataly862011 [7]
For bad software, probably a virus/malware/ransomware kind of thing. If it is good software, probably a program that organizes your files, adjusts certain things, but do not record your files (no programs are at the top of my head, sorry).
4 0
3 years ago
State ONE (1) disadvantage of using computers to store and process<br> information.
NNADVOKAT [17]

Answer:

it can be hacked

Explanation:

there is always a chance for computer data to be hacked

3 0
2 years ago
. Question 1. Given the following grammar S → aAb | bBA A → ab | aAB B → aB | b and for each of the following right sentential f
zmey [24]

Answer:

Explanation:

(a) aaAbb (b) bBab (c) aaAbB b

The parse tree and phases are shown in the attached diagram below

5 0
3 years ago
Read 2 more answers
ATMs are particularly helpful for people on unusual schedules.<br> a. True<br> b. False
larisa86 [58]
True, because if you need money on the go because you dont know where you are going, so you might need the money.
4 0
3 years ago
Read 2 more answers
Name all the keys of the home row.
Kaylis [27]

Answer:

Search key, a, s, d, f, g, h, j, k, l, : and ;, ¨ and ´, and the enter key.

5 0
3 years ago
Other questions:
  • Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
    8·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • How do you add Rulers to a document?: *
    6·1 answer
  • Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors p
    5·1 answer
  • how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
    7·2 answers
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • Please Help!
    13·1 answer
  • Please answer quickly :S
    7·2 answers
  • How are the waterfall and agile methods of software development similar?
    13·1 answer
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!