Answer:
True
Explanation:
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.
Answer:
He can use following computer program to make the class room more interesting and effective:-
- 1. <u>Reference software</u> : This software help students to access the atlases and dictionaries.Teacher can include this software in research projects .
- 2. <u>Educational Games</u>: This types of software is very effective for younger children because it motivates them to learn.This software companies have combined gaming and education into one .
- 3. <u>Graphical software</u> : Student can use this software to create and changes images available on the internet itselfs .
Answer:
B. #
Explanation:
Every preprocessing directive must begin with the # character.
For example:
#define : Used to define a macro
#ifndef : Conditional evaluation of macro
#include : Used to include other preprocessor header file as part of the code
As we can see each of the directives begins with the # character. This is a signal to the preprocessor to interpret the subsequent keyword as a directive.
Answer:
the answer might be 2......
Answer:
yes
Explanation:
can you send the link....