1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
15

It is important for security practitioners to take into consideration the __________ element when devising password security pol

icies to ensure confidentiality.
Computers and Technology
1 answer:
N76 [4]3 years ago
4 0

Answer:

The answer is "Evidence".

Explanation:

A "practitioner" is a person that has a specific practice or specialty directly involved. A safety professional of data is indeed another who engages in the protection of data.

Evidence is used in the course of the investigation to show certain material information or characteristics of a felony. Most people seem to believe that proof is just tangible, verbal evidence.

You might be interested in
Marijuana and hashish come from the hemp plant?
raketka [301]
Yes they come from the hemp plant
5 0
3 years ago
Shannon wants to work with renewable energy. She is researching what it would take to become a geochemist. A geochemist is someo
Liula [17]

Answer:

Critical thinking

Explanation:

Shannon needs to be a Critical thinker to be effective in this position. Critical thinking has to do with giving deep and good thoughts while doing analysis, or assessment in other to come up with good judgements about a subject or topic.

Since she is going to be studying water and elements in it, she would be doing a lot of analysis and assessments and In other to do good in her field she must learn to think critically before arriving at her conclusions.

3 0
3 years ago
Why backup system of data and software is necessary. ​
zavuch27 [327]

Answer:

The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event, such as a malicious attack (virus or malware), or accidental deletion of data.

7 0
3 years ago
All the concrete classes in the java collections framework implement _____________. the cloneable interface the comparable inter
liubo4ka [24]
Since java.util.PriorityQueue doesn't use the Cloneable interface, I think it's safe to say that Serializable interfaces are implemented in all instances.
8 0
2 years ago
"what command can be used on most linux distributions to find the directories where the man pages are kept"
BartSMP [9]

Answer:

Base name or -b command is used to locate only match directory in Linux.

Explanation:

base name can   primarily be used in shell script.

As we know that base name can be described  as a standard UNIX computer program. When we give a path name to any base then it  deletes each and every  prefix up to the last slash character and give back the result. base name can be defined in the Single UNIX Specification


6 0
3 years ago
Other questions:
  • PLEASE HELP POWER POINT:
    8·2 answers
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • Which of the following is true of how packets are sent through the internet?
    10·2 answers
  • What will be the value of “sumtotal” when this code is executed?
    6·1 answer
  • BRAINLIEST FOR CORRECT ANSWERS PLS HELP
    7·2 answers
  • I’m so lost. which username do i do.
    5·2 answers
  • Refund please, this has not helped at all.
    6·2 answers
  • Why is translator required?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!