1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
3 years ago
8

CreatePolicies I need help with this in java.

Computers and Technology
1 answer:
erica [24]3 years ago
7 0

Answer:

java

Explanation:

You might be interested in
Who said "BAM WHAT?!" On disney channel?
Yuki888 [10]
Maddie from Liv and Maddie 
4 0
3 years ago
Read 2 more answers
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
4 years ago
Read 2 more answers
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Elza [17]

Answer:

The correct answer to the following answer will be Speed.

Explanation:

  • As we all know that computer works at a remarkable speed, no one can match the speed of the computer system.
  • No one having the capacity of solving the computations (complex) fastest than any computer.
  • Its can be the feature by which connection of the network between a server and a switch can't be improved by the collection of link.

The other three options A, C and D can't be the features of network connection as they are not related to the given statement.

7 0
3 years ago
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
I’m buying a prebuilt pc once I get it and set it up, what do I need to install on it?
jarptica [38.1K]
First thing you want to install are the drivers for your GPU and CPU if they aren’t automatically installed. Just search the specific GPU or CPU and download them from the company websites. You can see your CPU and GPU by opening System Configuration or System. You also want to install the latest Windows defender updates as well as Windows updates. Once you have these completed, you should be all set. If anyone wants to add anything specific, feel free to comment below.
7 0
3 years ago
Other questions:
  • propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
    12·1 answer
  • What is a palindrome?
    13·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    9·2 answers
  • Create a Python program that:
    11·1 answer
  • When naming a file to upload into an assignment in blackboard, it is okay to use special characters?
    13·1 answer
  • Which utility is used to transform a standalone Windows Server 2012 R2 system into an Active Directory domain controller?
    6·1 answer
  • One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed
    5·1 answer
  • When using a small mic that attaches to your interview subject, where should you place that mic and why?
    5·1 answer
  • Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o
    10·1 answer
  • Explain why the scenario below fails to meet the definition of showrooming.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!