Answer:
the man behind the murder
<em>r = 15 cm</em>
<em>formula</em>
<em>V = πr²×h/3</em>
<em>replace</em>
<em>4950 = 22/7×r²×21/3</em>
<em>4950 = 22/7×r²×7</em>
<em>4950 = 22×r²</em>
<em>r² = 4950/22</em>
<em>r² = 225</em>
<em>r = √225</em>
<em>r = √15²</em>
<em>r = 15 cm</em>
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan
They are called functions on a spreadsheet.