1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
13

In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a

reas. What is not one of the areas?
Computers and Technology
1 answer:
Ugo [173]3 years ago
4 0

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

You might be interested in
How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
Cloud [144]
The yearly salary is xx,xxx just add some stuff in front maybe in back
6 0
3 years ago
Grace Hopper led the development of ______, a programming language for business applications.
soldi70 [24.7K]

Answer: Machine independent programming language which is known as COBOL.

Explanation:

 Grace hopper born in 1906 in the New York city and she made the machine independent programming language idea popular all over the world. It prompted the advancement of COBOL, an early significant level programming language even used today.

Preceding joining the US Navy, Hopper done her  Ph. D in the mathematics subject from the Yale University and she was also a professor at the Vassar College.

8 0
3 years ago
Read 2 more answers
11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
Anvisha [2.4K]
The correct options are as follows:
11. B
UUCP is a suit of computer programs and protocol, which enables remote execution of commands and transfer of files between computers. One of the command in the suite provides a user interface for requesting file copy operation.
12. C.
HTML document refers to a file that is containing a Hypertext Markup Language. It is usually made up of texts and graphics. HTML is used to create electronic documents which are displayed on the world wide web. Each page usually contains series of connections to other pages which are called hyperlinks. HTML tags are hidden keywords within the web page which defines how the web browser format and display the contents.
13. B.
Long documents can be divided into preliminary pages, main text and the index. The preliminary pages will include all the materials that the author want to add to the book that is different from the main texts, such as copyright section, acknowledgment, etc; while the back matter will make up of all the other materials that can not be added to the main text due to one reason or the other.
14. A
A margin refers to the area between the main context of a page and the page edges. The margin helps to define the point where the text begins and where it ends. The normal paper margin is one inch space. Microsoft word allows one to change paper margin according to one's desire.
15. A.
There are different types of fonts and other formatting tools in the Microsoft word which can be used to design the text that are produce on the software. For the sentence given above, the font used is Roman San serif type and the words are bolded.
16. D
A pica is equivalent to 1/6 of an inch. That is, 1 inch = 6 picas.
Then 5 inches will be equal to: 5 * 6 = 30.
Thus, 5 inches is equivalent to 30 picas.
17. A.
Leading refers to the space between lines of types; it is also called line spacing. Leading is measured in points from one baseline to the other. The leading value include the point size of the typeface and the actual space between the lines.
18. D.
Page column refers to vertical blocks of contents positioned on a page,which is separated by gutters or rules. Columns are usually used to break up large body of text that can not fit into a single block of text on a page.
19. C.
Typography is the procedure of arranging type data in order to make it legible, readable and appealing when it is displayed. It involves the process of formatting the type document using the available formatting tools on the Microsoft word.
20. C
A pica refers to a unit of type size and line length, which is equal to 12 points. A point is equal to 1/12 of a pica and so there are 12 points in a pica. In typography, a point is the smallest unit of measure, it is used for measuring font size, leading and other items on the printed page. 


 


8 0
3 years ago
Why did Hunter gatherers moved into the<br>America's?​
GrogVix [38]

Answer:

Explanation:

Hunter-gatherers are humans that get the food and living collecting wild plants and pursuing wild animals, this was the first human's adaptation, this people arrive to America from the Bering Strait from Asia Eurasia, they were following some prehistoric mammoths, and using primitive boats arriving at Pacific coast to South America.

8 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Other questions:
  • In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
    14·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Which is not an example of a lighter-than-air gas?
    5·2 answers
  • An email can lead to miscommunication because:
    6·2 answers
  • Energy is defined as stored energy
    13·2 answers
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • Hi All,
    12·2 answers
  • What is modern? explain​
    11·1 answer
  • To optimize the flow of data into and out of the cpu, the modern mcc provides at least _______________ of data every time the cp
    5·1 answer
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!