1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
12

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an inf

ormation security program. __________
Computers and Technology
1 answer:
zhenek [66]3 years ago
5 0

Answer: This Information Security Handbook assist and guide managers to establish and implement an information security program.

Explanation:

The handbook looks to implement adequate security programs and also to demonstrate their effectiveness.

You might be interested in
Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
lapo4ka [179]

Answer:

She needs to make time for offline and online activites.

Explanation:

The reason is because if you spend too much time online, you may have anxiety and depression. On the other hand, if you stay offline too much then, you will have trouble focusing on your hobbies, work, etc.

4 0
3 years ago
Which is the most likely problem if your computer starts up​ slowly, has many unwanted​ pop-up advertisements, and unusual hard
jeka94
You have a virus you should download malwarebytes free it covers everything
7 0
3 years ago
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
nataly862011 [7]

Answer:

D). Algorithm

Explanation:

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called an algorithm.

From the question, it is clear the correct option is algorithm.

In simple terms, to solve a problem the set of rules to follow is called algorithm. Algorithm in computer programming describes the steps that explains not only the task that needs to be performed, but also how to do it.

In algorithm, the steps are needed to be in the right sequence.

6 0
3 years ago
Read 2 more answers
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Hi guys
Anastaziya [24]
Vectors and arrays are 0-based, so they don't start at 1 but at 0

your sort works by switching positions of 2 elements, which in your case didn't happen for the pair of the first&second element
your outer-loop starts with k=1, which should be k=0 instead
6 0
3 years ago
Other questions:
  • Filtering removes data from the spreadsheet. A. True B. False
    9·2 answers
  • I NEED HELP!!!
    9·2 answers
  • Which html attributes are required in the image () element - check as many as apply
    9·1 answer
  • Suppose that you have been running an unknown sorting algorithm. Out of curiosity, you once stopped the algorithm when it was pa
    8·1 answer
  • Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer
    5·1 answer
  • Which one of these lifestyle factors has led to the buildup of litter in our
    13·2 answers
  • 1.printer is an example of......... device.<br><br>​
    11·2 answers
  • How can using Prezi software for a presentation allow the presenter to better respond to audience needs?
    10·1 answer
  • The Danger zone around a robot is?
    13·2 answers
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!