1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ratelena [41]
3 years ago
10

Which fund classification would a focus on only stocks of technology companies match?

Computers and Technology
1 answer:
Bumek [7]3 years ago
5 0

Answer:

Growth funds

Explanation:

This funds fucos on capital appreciation

You might be interested in
An interstate route with even numbers travels north/south. True or false?
lisov135 [29]

Answer:

I believe the answer is False

7 0
3 years ago
Read 2 more answers
It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
Andreyy89

Answer:

Regular Basis.

Explanation:

The plans should be clearly defined and checked regularly according to the set parameters. Also, there needs to evaluate one every week various types of environmental assessment have to be done. As the Disaster Recovery is a set of policies procedures and tools one needs to keep it updated to the current version. As any business needs to operate.

8 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
When will your stony brook email address become your default or preferred email address for official stony brook communications?
Leona [35]

The stony brook email address will become the default or preferred email address for official stony brook communications as from Aug. 14.

<h3>What is the email about?</h3>

This is known to be the primary campus email address.

Note that it is the address that the University sends official email notifications and it is said to become the 'preferred' or the default or preferred email address for official stony brook communications as from Aug. 14.

Learn  more about a email from

brainly.com/question/24688558

#SPJ1

4 0
3 years ago
A presenter selects multimedia materials primarily based on their ability to
Kisachek [45]
A presenter selects multimedia materials primarily based on their ability to emphasize a point.
7 0
3 years ago
Read 2 more answers
Other questions:
  • FILL IN THE BLANK...............
    8·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • In GamePoints' constructor, assign teamWhales with 500 and teamLions with 500. #include using namespace std; class GamePoints {
    13·1 answer
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • I'm taking a class on how to make a movie, and it offers some apps that would be helpful in the process. The thing is, I don't h
    9·2 answers
  • What is the largest positive number one can represent in an eight-bit 2’s complement code? Write your result in binary and decim
    7·1 answer
  • What machine learning technique helps in answering the question
    8·1 answer
  • Which of these is NOT a reason for an IP Address?
    15·2 answers
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!