1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
13

Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar

io training, page 3)
Computers and Technology
1 answer:
aliya0001 [1]3 years ago
4 0
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
You might be interested in
What is an internt?​
EastWind [94]

{\texttt{\huge{\purple{ANSWER :-}}}}

Internet is a worldwide system of computer networks which connects more than thousands of computers in which the users at any of the one computer can, if they have permission, get information from any other computer.

Usually named as "net ''.

8 0
3 years ago
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
sweet-ann [11.9K]

Answer:

yoooo nba BAD BAD

Explanation:

3 0
3 years ago
What charts the cost to the company of the unavailability of information and technology and the cost to the company of recoverin
Gala2k [10]

Answer:

D. Disaster recovery cost curve

Explanation:

Disaster Recovery Cost Curve can be regarded as the chart to the cost of the

unavailability of information and technology as well as the the cost to the company of recovering from a disaster over time. It should be noted that recovery plan is very essential in any organization because it makes response to disaster as well as other emergency that can tamper with information system to be easier as well as minimization of any effect of the disaster on business operations.

6 0
3 years ago
Which area would a Gaming Designer fall under? Research and explain why you think so. Make sure to site your source and where yo
pshichka [43]

Answer: Game Artist, Game Designer or Game Programmer.

Explanation:

All of which fall under a “Game Designer”

5 0
3 years ago
The operating system provides a ____, which is the means with which you interact with the computer
Soloha48 [4]
One answer could be a GUI = Graphical User Interface (e.g. Windows Explorer).
4 0
4 years ago
Other questions:
  • The use of computer and special software packages to create and edit documents
    11·1 answer
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Working in a meat factory packaging and shipping the meat deliveries falls into which agricultural cluster?
    7·1 answer
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • These statements describe the NOS.(choose all that applies)
    13·2 answers
  • Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the g
    9·2 answers
  • Prompt the user for a character and the height of a right triangle. Then, print a triangle of that height using the character en
    11·1 answer
  • What the best option if you cant show your PowerPoint presentation at all
    6·2 answers
  • HELP TIMED!!!!!!!!!!!!!!!!!!!!
    5·2 answers
  • What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitio
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!