1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
11

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th

rough a set of organizational guidelines?
A. Planning
B. Policy
C. Programs
D. People
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
7 0

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

You might be interested in
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. A.flowchart
Zina [86]

Answer:

Option B is the correct answer for the above question.

Explanation:

The control structure is a decision type structure which can be either true or false. It has two options-- If this then, does this otherwise do this. When the user wants to write he control structure then he can do this by the help of the following syntax in python language--

if(condition):

do this

else:

do this

The above question wants to ask about the concept which is used in the programming for a decision then the answer is control structure which is referred from the option B. Hence B is the correct option while the other is not because--

  • Option A states about the flowchart which is the picture form of the instruction.
  • Option C states about the pseudocode which is the language form of the instruction.
  • The operator is also not the correct option because it is used to perform the operation.

6 0
3 years ago
Which browser do most web users use and why do you think that it is that way? Make sure you search online for statistics to conf
oksian1 [2.3K]

Answer:

2b2t

Explanation:

2b2t

4 0
3 years ago
Which of the following is NOT true about mobile app development:
Arte-miy333 [17]

Answer:

The answer is C.

Explanation:

Websites are far quicker to develop than apps.

7 0
3 years ago
Create 3 individual measures that calculate the 1, 3, and 5-year enrollment growth rates (percentages). a. The measures should b
Inessa [10]

IN THIS QUESTIONS MAKING PROGRAMMING

5 0
3 years ago
Can anyone explain why red is sus? i saw him do medbay scan...
alexandr402 [8]

Answer:

If u watched him scan then he is good

Explanation:

6 0
3 years ago
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • The Spinning Jenny reduced the number of workers necessary to _______. a.remove cotton seeds from fibers b.pump water from the m
    7·1 answer
  • Maria's manager asked her to print a certain document for their meeting. It took her so long to find the file that she was late
    6·2 answers
  • During World War II, the Battle of the Coral Sea was significant because it evened the naval strength of the Japanese and US fle
    6·1 answer
  • __________ was the first operating system to integrate security as its core functions.
    15·2 answers
  • How to get bing with any node unblocker
    10·2 answers
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • How do I get the pictures from my old Samsung phone to put on my iPhone? The Samsung is turned off. Is there a way to transfer i
    8·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!