Answer:
Directive
Explanation:
A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.
On Microsoft Word, you can edit your Word.... You can add pictures, do journals, do menus, and stuff like that... You can add color to text, make lists, add shapes to your Word, etc...
Answer:
The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:
business continuity and disaster recovery plan.
Explanation:
An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster. After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth. While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.
Answer:
20
Explanation:
assuming the print statement is not indented, the program effectively calculates 2+5+6+7.
The range(...) is <em>excluding </em>the end value (8 in this case).
Answer:
open-source
Explanation:
open-souce software allows any user to submit modifications of the source code