1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
2 years ago
11

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th

rough a set of organizational guidelines?
A. Planning
B. Policy
C. Programs
D. People
Computers and Technology
1 answer:
Dmitriy789 [7]2 years ago
7 0

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

You might be interested in
Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
Andreyy89

Answer:

See explaination

Explanation:

import java.util.Scanner;

public class Word

{

public static void main(String args[])

{

Scanner read=new Scanner(System.in);

char repeat='Y';

String phrase=null;

int index=0;

while(repeat=='Y')

{

System.out.println("enter a phrase :");

phrase=read.nextLine();

while(index<=0)

{

System.out.println("enter an index greater than 0");

index=Integer.parseInt(read.nextLine());

}

String s;

int spaces = phrase == null ? 0 : phrase.length() - phrase.replace(" ", "").length();

int numofwords=spaces+1;

if(index>numofwords)

{

index=numofwords;

}

System.out.println("word is: "+ getWord(phrase,index));

System.out.println("do you want to repeat (Y/N)");

repeat=read.nextLine().charAt(0);

index=0;

}

read.close();

}

private static String getWord(String phrase, int index) {

// TODO Auto-generated method stub

Scanner in =new Scanner(phrase);

String word=null;

int wordindex=0;

while(wordindex!=index)

{

word=in.next();

wordindex++;

}

in.close();

return word;

}

}

Check attachment screenshot

4 0
3 years ago
What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
White raven [17]

Answer and Explanation:

The benefit of circuit switching is that it has a specialized circuit without exchanging (guaranteed performance). Packet-Converting uses either TDM or FMD. TDM has the added benefit of being able to use most of the (multiplexing) bandwidth.

  • It is the most recognizable method used to create a communication over network is circuit switching.
  • It can be used for regular phone conversations.
  • This enables people to share devices and circuits for conversation.
  • Through network utilization, every user has an exclusive connection to a circuit.
8 0
3 years ago
You have to calculate the total amount you spent at the mall today. Which function should you use to do so?
rosijanka [135]
If it has to be exactly then C-sum
3 0
3 years ago
Read 2 more answers
The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users t
docker41 [41]

Answer:

The correct answer is option A. "True".

Explanation:

Key management could either be manual or automated. The automated key distribution approach is more flexible and dynamic than the manual key distribution approach, because it is better at responding to changing requirements in the system. Additionally, the automated key distribution approach is faster and more economic as well as observable and auditable.

6 0
2 years ago
Sketch f(x) = 5x2 - 20 labelling any intercepts.​
Norma-Jean [14]

Answer:

  • The graph of the function is attached below.
  • The x-intercepts will be: (2, 0), (-2, 0)
  • The y-intercept will be: (-20, 0)

Explanation:

Given the function

f\left(x\right)\:=\:5x^2-\:20

As we know that the x-intercept(s) can be obtained by setting the value y=0

so

y=\:5x^2-\:20

switching sides

5x^2-20=0

Add 20 to both sides

5x^2-20+20=0+20

5x^2=20

Dividing both sides by 5

\frac{5x^2}{5}=\frac{20}{5}

x^2=4

\mathrm{For\:}x^2=f\left(a\right)\mathrm{\:the\:solutions\:are\:}x=\sqrt{f\left(a\right)},\:\:-\sqrt{f\left(a\right)}

x=\sqrt{4},\:x=-\sqrt{4}

x=2,\:x=-2

so the x-intercepts will be: (2, 0), (-2, 0)

we also know that the y-intercept(s) can obtained by setting the value x=0

so

y=\:5(0)^2-\:20

y=0-20

y=-20

so the y-intercept will be: (-20, 0)

From the attached figure, all the intercepts are labeled.

8 0
2 years ago
Other questions:
  • How to send an email
    7·2 answers
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • Write an assembly program that will prompt the user for 3 inputs (let’s abstractly call them a, b, and c) without a leading stri
    13·1 answer
  • What are the names of the four major varnas in the caste system?​
    9·2 answers
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size
    6·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • List the difference between GIGO and bug ​
    15·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!