1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
2 years ago
7

Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.

Computers and Technology
1 answer:
Crank2 years ago
8 0

Answer:

Violations of security policies are considered to be a(n) <u>law enforcement</u> issue upon which proper disciplinary actions must be taken.

Explanation:

The security policies are considered as law enforcement issue, which may include the rules and regulations of the society decided by the government. These rules and regulations are necessary to maintain the norms of society.

The issue comes under the law enforcement are cyber crime, women rights security in working environment of the organization, use of technology that may cause threats for the society.

To enforce these law to maintain the security in the society, department of law and enforcement has been established such as Police department, Some intelligence agencies. They takes proper disciplinary action under the law enforcement to maintain the security in society against violation of rules.

You might be interested in
explain why the database system would not allow a tuple to be inserted into the database through this view
Andrej [43]
For the view of Exercise 4.18, explain why the database system would not allow a tuple to be inserted into the database through this view.
For reference
For the database of Figure 4.12, write a query to find the ID of each employee with no manager. Note that an employee may simply have no manager listed or may have a null manager. Write your query using an outer join and then write it again using no outer join at all.
OUTER JOIN
select e.ID from employee e left outer join manages m on e.ID = m.ID
where m.manager_id is null;
NO OUTER
select e.ID from employee e where e.ID not in (select m.ID from manages m) or e.ID in (select m.ID from manages m where m.manager_id is null);
6 0
2 years ago
Is it possible to do calculations with text data in Ms Excel
ss7ja [257]
The answer for this question is YES
3 0
3 years ago
Read 2 more answers
In the LC-3, how many memory words are used to store the string "rainbow"?
oksian1 [2.3K]
The number of memory words used to store the string "rainbow" is 8.
5 0
3 years ago
What computer worm was used to sabatoge iran's nuclear program?
Stels [109]
Researches at symantec have uncovered a version of the stuxnet computer virus that was used to attack irans nuclear program in November.
4 0
3 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
Other questions:
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • 6 external parts of computer
    10·2 answers
  • Difference between a software package and Integrated software and why users would choose one over the other
    8·1 answer
  • Portable Document Format (PDF) is a file format that provides an electronic image of a document and can be viewed, printed, and
    12·2 answers
  • Question #3
    12·1 answer
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Kos-huar-utb garls jonly​
    8·2 answers
  • What keyword is used in Java to create a parent/child relationship between two classes?
    14·1 answer
  • Why might you use the More button in the Find and Replace dialog box?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!