1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
9

Which feature of a blog allows an author to interact and get feedback from his or her readers? link pingback commenting TweetMem

e
Computers and Technology
1 answer:
poizon [28]3 years ago
6 0
Commenting. When someone comments of a blog the blog's writer can comment back, to answer questions, etc.
You might be interested in
Which font attribute would be most appropriate to make a papers heading stand out?
eimsori [14]

If you want your heading to pop out I would go for bold Becuase it shows the letters darker and bigger which would make the heading the center of attention.

7 0
3 years ago
Read 2 more answers
Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will co
svlad2 [7]

Answer:

The best answer is "B"

xfs_fsr

Explanation:

The is a typical format of the command to use:

xfs_metadump -o /dev/sdb1 /reviewxfs

6 0
3 years ago
Read 2 more answers
Core to resource management system is the _________that coordinates the server hardware.
vichka [17]
Hehdhdjdjddjdjid iridium chi jo j o j o j o j
5 0
3 years ago
C Programming:
natita [175]
This is how to answer this programming question:

#include <stdio.h>
#include <conio.h>

int main(void)
{
   char letterStart;
   
   <span>fflush(stdin);</span>
   printf("Input character: ");
   scanf("%c", &letterStart);
   
   print("Next Letter: %c", ++letterStart);
   
   getch();
   clrscr();
}

7 0
3 years ago
Read 2 more answers
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
Other questions:
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • I have a problem with importing excel file into Access. I have some table in Excel and I want to import it into Access. When I d
    6·2 answers
  • You have spent $4,000 on liquor for your bar. Your bar sales have been $24,000. What is your cost of sales for liquor, expressed
    5·1 answer
  • 1024 Megabytes = ____________
    14·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • Does anyone play genshin impact here?
    12·2 answers
  • Which of the following is a key aspect of any IT position? installation of fiber optic cables
    14·2 answers
  • What is an advantage of using a fully integrated cloud based data analytics platform
    5·1 answer
  • What are the limits of hashing and verifying that files haven’t changed?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!