1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
6

_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli

cy frameworkC.Change managementD.Policy principles documen
Computers and Technology
2 answers:
Mrac [35]3 years ago
7 0

Answer:

Information systems security

Explanation:

Information Systems Security relates to the procedures and methodologies required to keep information private, confidential accessible and preserving the data integrity and security of the information. These methods apply to access controls, which restrict the unauthorized access to a system, detect and prevent violations of confidentiality, and document these events . Information System Security deals with the security of computer systems, security of data and communication and also deals with the unintentional data related signals , these signals may cause leakage of security information.

A policy framework is framework that points out a set of guidelines or goals, that could be used in decision making  to direct a more comprehensive set of policies, or to guide the ongoing maintenance of the policies of an organization. So this is not true.

Change management is the supervised recognition and execution changes required within a computer system. So its also not true.

Policy principles document refers to the document on policy principles and it defines responsibilities and corresponds to specific policies on more detailed issues. so its not true.

mylen [45]3 years ago
3 0

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

You might be interested in
The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
Reptile [31]

Complete Question:

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Group of answer choices

a. Router

b. Switch

c. Bridge

d. Hub

Answer:

d. Hub.

Explanation:

A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.

<em>Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.</em>

7 0
3 years ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
stira [4]
I believe it is B hope this helped you<span />
5 0
3 years ago
BUURTAIS
Alisiya [41]

Answer:

what I'm confused ???????

Explanation:

?

4 0
3 years ago
When it comes to saving money, what is a good rule of thumb?
Leviafan [203]
-Not to make impulse buys
-Open a savings account that directly adds a set amount of money into it from your paycheck monthly 
-The '50-30-20' rule(<span>50 percent of your income toward necessities, like housing and bills. Twenty percent should then go toward financial goals, like paying off debt or </span>saving<span> for retirement. Finally, thirty percent of your income can be allocated to wants, like dining or entertainment.)</span>
-Create a budget 
6 0
3 years ago
Read 2 more answers
Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entrega
Afina-wow [57]

Answer:

1. Software de aplicación: Microsoft Word.

2. Software de diagnóstico: Speccy.

3. Software de sistema: Windows operating system (OS).

Explanation:

Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.

Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;

1. <u>Software de aplicación</u>: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.

Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.

2. <u>Software de diagnóstico</u>: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.

Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.

3. <u>Software de sistema</u>: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.

Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.

8 0
3 years ago
Other questions:
  • you are a software engineering consultant and have been called in by the vice president of finance of a corporation that manufac
    10·1 answer
  • You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send
    8·1 answer
  • Janet is testing the effectiveness of four different plant foods. She plants four identical seeds in four identical pots, supply
    6·2 answers
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • "write a program that reads two floating point numbers and prints their sum difference and product."
    13·1 answer
  • Which searching method requires that the list be sorted?
    5·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Columns are labeled with letters and Rows are labeled with numbers.
    5·1 answer
  • The editing of digital photos us about the same level of difficulty as editing an analog photo
    12·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!