1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
2 years ago
12

Which cyber protection condition establishes a protection.

Computers and Technology
1 answer:
I am Lyosha [343]2 years ago
5 0

The cyber protection condition which establishes a protection priority focus on critical and essential functions only is: INFOCON 

You might be interested in
If you Owned a business, what part of Microsoft Office would you use the most and why, which would you use the least and why, an
snow_lady [41]
<h2>Answer 1 with Explanation </h2>

Microsoft Word would be the most used part of the Microsoft office because you can type letters and draft documents easily including company reports, budgets, presentations, proposals and plans. It can also assist you with essential forms by building a library such as invoices, statements, receipts, agendas and memos and apart from this, you can create a mailshot where you can send a letter to some or all of your customers.

<h2>Answer 2 with Explanation </h2>

Microsoft presentation is the least used part of the Microsoft Office because it can only be used to make any presentation which may not be in need most of the time as the business is to be productive and communicate effectively. It involves emailing, letter writing, create documents, and more. Therefore, that it is easier for you to manage or organize all the details or important statements in one way and save it to be used at a later time and it does not get misplaced.

<h2>Answer 3 with Explanation </h2>

Microsoft Excel can be utilized to create notes, record sales trends and other business data. It provides business with tools that they need to make the most out of the data and excel spreadsheets are commonly used in every business to display financial information. To create grids of text, numbers, and a formula involving calculations, Microsoft Excel can be used conveniently as it is used to record expenditures, income and plan budgets.

4 0
3 years ago
Which of the following restricts the ability for individuals to reveal information present in some part of the database?
Anni [7]

Answer:

it would have to be flow control which would be C.

Explanation:

8 0
3 years ago
Write a SELECT statement without a FROM clause that uses the NOW function to create a row with these columns: today_unformatted
OlgaM077 [116]

Answer:

SELECT

NOW() AS 'today_unformatted',

DATE_FORMAT(NOW(), '%d-%b-%Y') AS 'today_formatted';

Explanation:

%d represents date.

%b represents month.

%Y represents year.

5 0
3 years ago
.____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
padilas [110]

Answer: Brand

Explanation:

A brand is a way to identify and differentiated the good and services as, brand is the process, which is used for the business and the marketing strategies. Basically, it is used as communication method for distinguished the products and the company for creating the good impression for customers. Brand awareness and management is the main key components.  

3 0
4 years ago
Sarah is delivering a presentation on the solar system. Each slide consists of not more than four to five points. However, she n
slava [35]

Answer:

Handouts

Explanation:

Handouts is the section where the audience can have a more detailed grasp on the points presented in the slide for more in dept information about the presentation.

5 0
3 years ago
Other questions:
  • A sample containing 4.30 g of O2 gas has an initial volume of 13.0 L. What is the final volume, in liters, when each of the foll
    5·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • In the case of a security incident response, the Building and Implementing a Successful Information Security Policy whitepaper c
    13·1 answer
  • Generate a row vector b=[1 2 3 4 5 6 7 8 9 10] using linspace function, give the commands and show print-screen of the result.
    11·1 answer
  • Which term is used to define the wires on a motherboard that move data from one part of a computer to another?
    13·1 answer
  • What is ‘Software Testing’?
    13·1 answer
  • DNA structure can be described as a twisted ladder. Imagine you are climbing a model of DNA, just as if you were climbing a ladd
    10·2 answers
  • What happens in the process represented by the flowchart ?
    14·1 answer
  • Your friend Aria is complaining that programming seems too complicated. She says, “Why do we need things like sequence, selectio
    11·1 answer
  • when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!