1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
4 years ago
12

It is advised to always have discretion with leaders. Explain in general terms what information security policies can and cannot

achieve. It is equally important to be conservative in your estimates regarding the impact on the business; otherwise you risk losing credibility. Is this true or false? Explain.
Computers and Technology
1 answer:
JulsSmile [24]4 years ago
4 0

Answer:

Explanation:

Information security policies helps to protect information and reduce risk of inappropriate access to data information, modification of information and then disclosure of classified information. Information securities helps to promote and protect confidentiality. This information are protected using password, encryption,legal liability.

Information policies need to be upheld, the policies are guide to information credibility when the rules and guidance are not followed

and adhered to information or data kept can be lost. They are as important as the people handling it.

It is true that estimate regarding a business should be conserved and this could risk credibility. Each organization and business have some classified information about how they operate and run their business when such data cannot be protected it could become a threat hence all information and estimates should be well conserved.

You might be interested in
What Is an Antivirus?
wariber [46]
Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
8 0
3 years ago
Read 2 more answers
A computer lab is an example of what type of network
alexandr402 [8]

computers i think i dont sounds right to me

4 0
3 years ago
Identify the variables listed below as either quantitative (discrete or continuous) or categorical (nominal or ordinal):
Akimi4 [234]

Answer:

Quantitative: Age, heart rate, number of pets, salary

 <em>discrete</em>: number of pets

 <em>continuous</em>: Age, heart rate, salary

Categorical: Gender, eye color, metal rankings

<em>Nominal:</em> Gender, eye color

<em>Ordinal:</em> metal rankings

Explanation:

Quantitative are those variables which are for quantity or number with units for measurement.

Categorical are qualitative variable which can be categorized or grouped in different groups or it may be ranking scales

5 0
3 years ago
PLEASE BE CONFIDENT ABOUT YOUR ANSWER
Zigmanuir [339]

Answer: d. should be lowercase.

Explanation:

ID attributes are case sensitive for the most part - DOM and Java Script - which means that the ID attribute does not always have to be lowercase.

It can be uppercase as well. ID attributes can also start with a number and as of HTML 5 can start with a special character as well. Finally, the ID attribute must always be unique within each document.

8 0
3 years ago
Read 2 more answers
Can someone smart help me
nalin [4]

Answer:

Answer

Explanation:

The only thing that is wrong with this code is the fact that the link is not completed (should be https://[link name].com/)

Other than that the code is fine

7 0
3 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • A food web is shown below. In this food web, energy is transferred directly from the to the
    11·1 answer
  • One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro
    15·1 answer
  • You have answered 4 of 18 questions.
    12·2 answers
  • You change a document that is saved on your computer by cutting text from the document what happens to the text when you preform
    5·1 answer
  • A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion th
    14·1 answer
  • Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly call
    7·1 answer
  • Computer technology has changed our lives write of a least five ways to show how this is so​
    15·1 answer
  • The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home.
    13·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!