1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
4 years ago
12

It is advised to always have discretion with leaders. Explain in general terms what information security policies can and cannot

achieve. It is equally important to be conservative in your estimates regarding the impact on the business; otherwise you risk losing credibility. Is this true or false? Explain.
Computers and Technology
1 answer:
JulsSmile [24]4 years ago
4 0

Answer:

Explanation:

Information security policies helps to protect information and reduce risk of inappropriate access to data information, modification of information and then disclosure of classified information. Information securities helps to promote and protect confidentiality. This information are protected using password, encryption,legal liability.

Information policies need to be upheld, the policies are guide to information credibility when the rules and guidance are not followed

and adhered to information or data kept can be lost. They are as important as the people handling it.

It is true that estimate regarding a business should be conserved and this could risk credibility. Each organization and business have some classified information about how they operate and run their business when such data cannot be protected it could become a threat hence all information and estimates should be well conserved.

You might be interested in
Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-le
attashe74 [19]

Answer:

Machine Language.

Explanation:

The most basic language that is used by computers so that they can control the operation of the on/off switches  in the circuitry is Machine language.

Machine Language is a low level language is a collection of binary digits or bits that is understood by the computers.Computers are capable of understanding only machine language.

3 0
3 years ago
Plz I need the answer ASAP. I’ll mark brainliest
Elena L [17]

Answer:

A string containing all lowercase letters and numerals and ending with a- Or D

4 0
3 years ago
An administrator has just added a new update to the WSUS server and she wants to test the update to the test group. Which of the
DENIUS [597]

Answer:

a. gpupdate /force

Explanation:

Based on the information provided within the question it can be said that if the administrator does not want to wait she can use the command gpupdate /force. This command allows the individual to update both the local Group Policy settings and Active Directory-based settings. This the force tag makes it so that the policy is immediately update.

6 0
4 years ago
Algorithms may be inefficient when used by a human brain.Answers:a. Algorithms can take in a relatively small amount of informat
Flauer [41]

Answer:

The correct answer is d. Algorithms may be inefficient when used by a human brain.

Explanation:

This is a situation typical of algorithms, since in order for them to work perfectly, the participation of people who carry out the necessary tests is required for the new creation to be useful in a specific field. Algorithms are logical operations determined according to a pattern, but the functioning of the human brain is in many cases different from a simple algorithm, since it associates situations and, depending on their complexity, also solves them.

3 0
3 years ago
Read 2 more answers
Which of the following steps should you take after attending a college fair?
leonid [27]

D. Make a decision about which colleges to attend that night.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each
    14·1 answer
  • On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
    10·1 answer
  • Which of the following need NOT be completed separately if a worksheet is prepared?
    6·1 answer
  • Ron travels extensively. He posts articles, photos, and videos about his experiences on a website. Which type of electronic comm
    9·1 answer
  • In one to two sentences, explain how to save a new document.
    15·2 answers
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • What tab should you choose to locate the copy and paste tool?
    10·2 answers
  • Janet has created a 3D movie. She wants to make a copy of the movie and store it for future use. Which device should she use?
    14·1 answer
  • ......................... and ....................... are two ways to define the text in Inkscape.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!