1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Generally considered to be the most important information security policies, what item below defines the actions a user may perf

orm while accessing systems and networking equipment?
Computers and Technology
1 answer:
Alchen [17]3 years ago
6 0

In organization security on information is the most important concern.  The police to drafted or made and dully signed by both employee and employer not to share the information to shared such as a password or any file to the outside world.

<u>Explanation:</u>

1. Share the network access password to an unauthorized person to access.

2. Sharing the workstation or desktop or laptop login password or file sharing outside the world to be avoided.

3. In any person not following and brought to notices and take necessary action and terminate the employee from the organization.

You might be interested in
True or false mobile devices need to work within limited screen space
eduard
A phone may have a 4 inch screen and so it cant just extend to 5 inches. So it would he true
3 0
3 years ago
Read 2 more answers
I need help with these
solmaris [256]

Answer:

Choose internet is the right answer

7 0
3 years ago
If you install the same default tracking code on pages with different domains, Analytics will count these users and sessions sep
elixir [45]
I guess you need to know if it is true or false. Then this one is true, Google Analytics will count the users and sessions with different domains separately. It's important to include tracking code on every page you want to track. This is the sequence to find your tracking code: Admin => Tracking Info => Tracking code.
6 0
3 years ago
Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-on
Naily [24]

Answer:

Let f be a function  

a) f(n) = n²  

b) f(n) = n/2  

c) f(n) = 0  

Explanation:  

a) f(n) = n²  

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.  

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                               f(a) = f(b) ⇒ a² = b² ⇒ a = b  

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.  

b) f(n) = n/2  

The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:

                               f(2n) = [2n/2] = n  

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:  

When the value of n=1, then

                                  n/2 = [1/2] = [0.5] = 1  

When the value of n=2 then  

                                   n/2 = [2/2] = [1] = 1  

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

5 0
3 years ago
Write a simple nested loop example that sums the even and odd numbers between 5 and 15 and prints out the computation.
lianna [129]

Answer:

for e in range(6, 15, 2):

for o in range(5, 15, 2):

calc = e+o

print(e, "+", o, "=", calc)

Explanation:

4 0
3 years ago
Other questions:
  • (3.01 MC)
    11·1 answer
  • What Will Social Media Look Like in the Future?
    6·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • This isn't a question
    8·1 answer
  • Alt +f4 is a short cut of close a document in MS word /ture /false​
    15·1 answer
  • Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None
    10·1 answer
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • What to do if you click on a phishing link on iphone
    9·2 answers
  • given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_val
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!