1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
12

Blair is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an emp

loyee must do on his or her computer before leaving for the evening. This situation relates to which of the following components of information system security?
A. Software
B. Data
C. People
D. Procedures
Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
4 0

Answer:

data

Explanation:

Because i said so

You might be interested in
Which statement does not describe how to save a presentation?
Hunter-Best [27]
<h2>Hello!</h2>

The answer is 1.) Click in the side panel

<h2>Why?</h2>

All of the three other options are correct steps to save a presentation.

2.) Click on the save icon: Clicking on the save icon will show you the saving options that you may use like: saving locations, saving file names, selecting the format and version of the file you want to save, among others.

3.) Giving it a name that makes sense: Giving a name that makes sense will help you to find the file in the future with no effort, you can select the name you want to use after you click on the save icon.

4.) Select save from the file menu: It will be the last step after you have set all your preferences. After this step, you will be able to find the file that you just saved in the location that you have chosen.

Have a nice day!

8 0
3 years ago
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
yarga [219]
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
5 0
3 years ago
What are the paparazzi?
Roman55 [17]

Answer:

d.photographers who follow stars to take pictures

8 0
3 years ago
One of the attributes in a table in your database depends on another attribute for its meaning. What type of dependency has been
posledela
We call it functional dependencies.

A functional dependency which is also commonly known as a database dependency occurs in a database when info stored in the same database determines other information stored in the same table. Knowing the value of a set of attribute is enough to tell you the value of another set of attributes.



5 0
3 years ago
Which of the actions below will not create more room on your hard drive?
slavikrds [6]
A. defragging your hard drive
4 0
3 years ago
Other questions:
  • When Aaron was called for an interview at a graphic designing company, his first interview test assessed his creativity and his
    7·2 answers
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    8·1 answer
  • Which social network site has 1.5 billion actives users per month?
    15·1 answer
  • How does this splitting wedge make work easier?
    15·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • 80. A .......... is used to read or write data.<br>A. CD B. VDU C. ROM D. RAM​
    6·1 answer
  • How would you open the web browser in Linux and still have access to the Linux terminal?
    14·1 answer
  • What is a database and provide 2 examples of how you are using a database.
    5·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!