1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
11

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th

rough a set of organizational guidelines?
A. Planning
B. Policy
C. Programs
D. People
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
7 0

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

You might be interested in
Meaning of mesh topology​
Pachacha [2.7K]

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

<h3>What is meant by mesh topology?</h3>

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

brainly.com/question/14879489

#SPJ1

6 0
1 year ago
Columns can be added to a page in the page layout tab in the blank grouping
ZanzabumX [31]

Answer:

Page Setup Grouping.

Explanation:

In Microsoft Word, Columns break up the page into, at max, 13 columns, and at minumum, 2. The way you go about doing this is

  1. Go to the Layout Tab
  2. Go to the Page setup Grouping
  3. Click on the Columns Action
  4. In the Dialog Box, choose either from one of the presents, or custom make your own column settings.
  5. Click Okay
  6. Done!

3 0
3 years ago
Read 2 more answers
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
3 years ago
You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
aniked [119]

Answer:

Shrink the primary partition and create a simple volume for Windows 10.

Explanation:

The EFI’s partition space, after it is shrunk, will not be enough to install your Windows 10 since by default; it can only hold a maximum space of about 250MB to 500MB. Some windows versions call this partition EFI while others refer to it as system reserved. Windows uses EFI partition to hold on to essential components that make your PC boot like boot loaders, system utilities, and a few more.

The answer is B.

When you shrink your volume, whether it is local disk C or a primary partition with plenty of free space, it will create unallocated space. Right click on the unallocated space and create a New Simple Volume that will let you format your partition, assign a drive letter, and install your Windows 10 Operating System.

5 0
3 years ago
Read 2 more answers
Todd insisted on having an image to go with every slide. Is this good or bad?
valentina_108 [34]

Answer:

Yes, Its a good idea but depends upon type of image. Like adding a logo to all the slides at top left corner is not just good but a must for all as well, when we are preparing official documents. However, other images when decided to be repeated must convey the correct intent in each page. If this is not the case, you need to avoid it. Intent is the most important aspect certainly. For rest see explanation.

Explanation:

Yes, and as mentioned above adding logo and other images meaningfully, and with correct intent is a good idea.

However, images must not be blurred, tiny or stretched. Also proper cropping is a must. The border should be solid as well. And when selecting a lot of images, the images must convey the correct meaning together. Moreover, the aspect ratio after stretching must be same as the original. You can do this in PowerPoint by going to format > crop > fill.

Ensure that watermarks are not revealed. Buy them rather than copy from somewhere for better outcome. And never amputate your readers with a headache creating backgrounds. You will loose readers then. The clip arts must be used in right number, and not a lot of them certainly.

Ensure both text and images are in correct ratios. Avoid using more than 2 images per slide.

5 0
3 years ago
Read 2 more answers
Other questions:
  • _____ allow(s) a user to double click with the mouse in a document to move the insertion point to a new location.
    11·1 answer
  • Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
    13·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
    6·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
  • The standard naming convention prefix tag for a query used to identify the object type is?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!