1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
8

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua

te threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.
Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
8 0

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

You might be interested in
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
How do i install windows 7 on virtual machine?​
liberstina [14]

Choose Start→All Programs→Windows Virtual PC and then select Virtual Machines. Double click the new machine. Your new virtual machine will open onto your desktop. Once it's open, you can install any operating system you want.

3 0
3 years ago
A small program that sends itself to other computers, rather than relying on user actions, is a
PSYCHO15rus [73]

Virus.

A virus is a malicious program or script that Spreads. 

Malware, however, will not spread. 

Viruses can spread without a victim's permission because it is automated to do so. 

For example, the Melissa virus would look like a file attachment that used reverse psychology to make you open it. From there, it goes through the first 50 email contacts stored on your computer and sends the virus to them from your computer. 
8 0
3 years ago
What platform was PlayerUnknown’s Battlegrounds release on in March of 2018?
sveticcg [70]

Solution:

The game was released for Microsoft Windows via Steam’s early access beta program in March 2017, with a full release on December 20, 2017. That same month, the game was released by Microsoft Studios for the Xbox One via its Xbox Game Preview program, and officially released in September 2018. In early 2018, it was localized and released by Tencent Games in China, while two mobile versions based on the game for Android and iOS were also released. The game is one of the best-selling of all time, with over fifty million sold across all platforms by June 2018. In addition, the Windows version holds a peak concurrent player count of over three million on Steam, which is an all-time high on the platform.

Battlegrounds presented new types of gameplay that could be easily approached by players of any skill level and was highly replay-able. The game received several Game of the Year nominations among other accolades, and is considered by Greene to be the defining game of the battle royal genre. Several other video games, following in Battleground’s success, added battle royal-style modes, while a number of clones, primarily out of China, also appeared. PUBG Corporation has run several small tournaments and introduced in-game tools to help with broadcasting the game to spectators, as they wish for it to become a popular eSport.

Loot boxes! More loot boxes! Locked loot boxes! Selling loot boxes! Cheating for loot boxes! This has been the story of player Battleground for a few months since developer PUBG Corp (a division of Blue hole) has slowed down on making their flagship game better.


4 0
3 years ago
Read 2 more answers
Why star topology is more reliable than bus or ring topologies
Valentin [98]

Answer:

<h3><em><u>simple </u></em><em><u>ans</u></em></h3>

Explanation:

<h2><em><u>it </u></em><em><u>is </u></em><em><u>because </u></em><em><u>as </u></em><em><u>it </u></em><em><u>has </u></em><em><u>server </u></em><em><u>computer </u></em><em><u>and </u></em><em><u>no </u></em><em><u>one </u></em><em><u>are </u></em><em><u>free </u></em><em><u>as </u></em><em><u>other </u></em><em><u>topology </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em></h2>

<h2><em><u>client </u></em><em><u>computer </u></em><em><u>should </u></em><em><u>ask </u></em><em><u>server </u></em><em><u>to </u></em><em><u>share </u></em><em><u>any </u></em><em><u>information </u></em><em><u>ideas </u></em><em><u>etc.</u></em></h2>

<em><u>this </u></em><em><u>much.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

<h2><em><u>follow</u></em></h2>
8 0
2 years ago
Read 2 more answers
Other questions:
  • What is cyber safety?
    14·1 answer
  • Write a complete C++ program that do following. Read a positive integer from the user with proper prompt. Assume that this user
    9·1 answer
  • Multiple Choice
    6·1 answer
  • Keyboard question: <br> How do I make the 'congruent to' symbol on this keyboard?
    8·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • Blending two or more colours is called​
    6·1 answer
  • 1. Very short questions.(any four) 14)<br>a. Write down the working principle of a computer.​
    10·1 answer
  • Positive use of the technology before the pandemic.
    8·1 answer
  • Which of the following parameters is optional sample(a,b,c,d=7
    9·1 answer
  • Who was the father of computer?????​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!