1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
6

When inside a closed work environment, its okay to openly talk with co-workers about PII

Computers and Technology
1 answer:
serious [3.7K]3 years ago
6 0
I am not able to give you an accurate answer because your question is a statement.
You might be interested in
Which of the following postfix expressions corresponds to the given infix expression?
Ivan

Answer:

C) 1 4 2 / + 1 + 2 + 3 * 2 /

Explanation:

Infix, Postfix and Prefix are 3 different ways of writing expressions which differ in relative placement of operator and operands.

In Infix , operator lies between the operands whereas in postfix operator is written after its operands.

For example: 1 + 2 is infix while 1 2 + is the corresponding postfix expression.

Converting the given infix expression (1 + 4 / 2 + 1 + 2) * 3 / 2 to postfix:

Let (1 + 4 / 2 + 1 + 2) be represented by x.

Converting x to postfix:

(1 + 4 / 2 + 1 + 2)  =>  1 4 2 / + 1 + 2 +       ------------------------- (1)

So the overall infix expression becomes:

x * 3 / 2

Converting it to postfix:

x 3 * 2 /

Replacing the value of x from (1)

1 4 2 / + 1 + 2 + 3 * 2 /

4 0
3 years ago
Your users are calling the help desk, complaining that they are constantly losing work they have done on a document in Word. How
Natalka [10]

Listen to the story of what every had happening evaluate after learning what was happening to everyone, try to solve the problem.


Im not to sure how to explain this.

3 0
3 years ago
Read 2 more answers
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
PLEASE HELP!!! Me turn this into a video & add liana flores- raise the moon (instrumental) in the background for the music.
Marina CMI [18]

Answer:

Try going to your settings and allow output camera

Explanation:

5 0
2 years ago
Read 2 more answers
Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
ruslelena [56]
Photography is the best choice but video game designers are also nice
please mark as brainliest
 
5 0
3 years ago
Read 2 more answers
Other questions:
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • What is a data mining??
    5·1 answer
  • You can change the color of the value of a cell or the background
    14·2 answers
  • 1. Consider the following code segment.
    8·1 answer
  • What is the other alternative keyboard to the qwerty?
    10·2 answers
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • Do you think that using robots at home would be good and helpful?
    11·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
  • Why did NFL equip its players with RDIF tags?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!