1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
9

Process and procedures are important but not critical to the effective use of computer based information systems.

Computers and Technology
1 answer:
larisa [96]3 years ago
6 0

Answer:

False

Explanation:

Process and procedures are important and critical to the effective use of computer based information systems.

This is because without process and procedures computer based information systems cannot solve the problems that a business or an organization faces.

Process and procedures define the way computer based information systems is used.

You might be interested in
I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
pychu [463]
Hmmm what do you want to talk about??
3 0
3 years ago
Read 2 more answers
which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
Ratling [72]

The statements that are true regarding incoming and outgoing interfaces in firewall policies are:

  • A zone can be chosen as the outgoing interface.
  • -Multiple interfaces can be selected as incoming and outgoing interfaces.

<h3>What is a firewall?</h3>

A firewall is a network security device used in computing that monitors and regulates incoming and outgoing network traffic in accordance with pre-established security rules. Typically, a firewall creates a wall between a trustworthy network and an unreliable network, like the Internet.

A firewall aids in defending your network from intruders. A firewall protects your network by operating as a continuous filter that constantly scans incoming data and blocks anything that appears to be suspicious.

Therefore, the statements that are true regarding incoming and outgoing interfaces in firewall policies are:

A zone can be chosen as the outgoing interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

Learn more about firewall on:

brainly.com/question/13693641

#SPJ1

Which statements are true regarding incoming and outgoing interfaces in firewall policies? (Choose two.)

Select one or more:

-An incoming interface is mandatory in a firewall policy, but an outgoing interface is optional.

-A zone can be chosen as the outgoing interface.

-Only the any interface can be chosen as an incoming interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

4 0
2 years ago
"When using BitLocker on a laptop, the laptop should not use standby mode, rather it should use hibernate mode. This is because
Harman [31]

Answer:

This statement is false.

Explanation:

The correct statement should read:

"When using BitLocker on a laptop, the laptop should not use standby mode, rather it should use hibernate mode. This is because Hibernate writes memory to the computer’s disk drive, ****which means the contents of the computer's memory are protected by Bitlocker.****

Standby mode (which is basically putting the computer to sleep) keeps the computer in a very low power state, and memory is maintained and not protected by BitLocker."

Hope this Helps.

6 0
4 years ago
You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
Debora [2.8K]

Answer:

Please see attachment for differentiation.

6 0
3 years ago
A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
earnstyle [38]
From the perspective of the client,  the correct order of the protocol stack that is used to prepare the request for transmission <span>for a webpage to a web server </span><span>is:
</span>HTTP<span> - The Hypertext Transfer Protocol </span>
TCP  -
Transmission Control Protocol
IP  -
Internet Protocol
Ethernet
8 0
3 years ago
Other questions:
  • file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
    6·1 answer
  • Command icons under the following file tab in its function
    14·1 answer
  • Which of these components is a part of the central processing unit (CPU) of a computer? A. memory B. storage C. control unit D.
    8·2 answers
  • 14. You can store data copied from any Office application file with the
    14·1 answer
  • For what parties the prepare documentation ​
    9·1 answer
  • True of False - use T or F The Math class can be instantiated.
    15·1 answer
  • (TCO 4) What will the following program segment display? int funny = 7, serious = 15; funny = serious % 2; if (funny != 1) { fun
    14·2 answers
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workst
    15·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!