1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
11

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th

rough a set of organizational guidelines?
A. Planning
B. Policy
C. Programs
D. People
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
7 0

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

You might be interested in
Among the web programming languages, css is used to define _____ of the web page
Slav-nsk [51]

CSS is used to define format the layout text styles, table sizes, and other aspects etc of Web pages

4 0
3 years ago
As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
WINSTONCH [101]

Answer:

D. Her computer is a DHCP client.

Explanation:

Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well

So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address

Hence, the correct option is d.

4 0
3 years ago
What are the purposes of a good web page design?
zimovet [89]

Answer:

To make people interested.

Explanation:

8 0
3 years ago
Read 2 more answers
Assignment 1 silly sentences
ololo11 [35]

Answer:

Sally sells sea shells by the sea shore

Explanation:

3 0
3 years ago
File Letter Counter
Zanzabum

Answer:

The solution code is written in Python.

  1. fileName = input("Enter file name: ")
  2. target = input("Enter target character: ")
  3. with open(fileName, "r")as reader:
  4.    content = reader.read()
  5.    print(content.count(target))

Explanation:

Firstly, use <em>input() </em>function to prompt user for a file name. (Line 1)

Next, we use input() function again to prompt user input a target character (Line 2)

Create a reader object and user <em>read() </em>method to copy entire texts from to the variable<em> content </em>(Line 4 - 5).

At last we can get the number of times the specified character appears in the file using the Python string built-in method <em>count() </em>(Line 6)

5 0
4 years ago
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • At the Network layer, what type of address is used to identify the receiving host?
    10·1 answer
  • Select the instances in which you should include a comma.
    13·1 answer
  • Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
    8·1 answer
  • During a network evaluation an administrator discovers excessive cable between a transmitter and its antenna. To clean up the lo
    9·1 answer
  • The word “Intrapersonal”means----------------------.Within the personSelf talkExtrovertOutgoing person
    10·2 answers
  • make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage sm
    8·1 answer
  • What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop
    14·1 answer
  • A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
    9·1 answer
  • 9. Which of the following will best protect your computer from viruses and hackers?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!