Answer:
A (information technology)
Explanation:
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
- General Policies
- Server Policies
- VPN Policies
- Back-Up Policies
- Firewall Access and Configuration Policies
Cheers!
Answer:
- The graph of the function is attached below.
- The x-intercepts will be: (2, 0), (-2, 0)
- The y-intercept will be: (-20, 0)
Explanation:
Given the function

As we know that the x-intercept(s) can be obtained by setting the value y=0
so

switching sides

Add 20 to both sides


Dividing both sides by 5





so the x-intercepts will be: (2, 0), (-2, 0)
we also know that the y-intercept(s) can obtained by setting the value x=0
so



so the y-intercept will be: (-20, 0)
From the attached figure, all the intercepts are labeled.
Okay what do you need to know