1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
2 years ago
5

What’s the answer????

English
1 answer:
Oksanka [162]2 years ago
6 0

Answer:

U.S. census agriculture schedule.  

You might be interested in
Which one is it I really need to know
Licemer1 [7]

Answer:

the last one

Explanation:

this word means, writing paper and other office materials.

4 0
3 years ago
Ideas for the inside of a haunted house?
omeli [17]
Put a paper made slender man
3 0
3 years ago
Who is responsible for protecting organizational information?
shtirl [24]

The board of directors is, and has always been, accountable for the organization's security and integrity, including information security.

<h3>What is the CISO's function in managing data security?</h3>

The CISO of a corporation is the advocate for data security within the company. The incumbent of this position is in charge of developing the policies and strategies to protect data from threats and vulnerabilities as well as the reaction strategy in case the worst case scenario occurs. CISOs must first identify every piece of sensitive data that belongs to their firm in order to accomplish this. They will be able to comprehend the dangers that this data may face as well as any weaknesses in the present IT ecosystem. From here, they may develop specific policies and put into practice particular technology that will best safeguard this data and guarantee that their businesses continue to comply with the privacy laws controlling their sensitive data.

Additionally, CISOs will be in charge of informing executives, stakeholders, and the rest of the organization about all matters relating to cybersecurity, such as potential threats, weaknesses in the current cybersecurity environment, best methods for addressing those vulnerabilities, the advantages of implementing new cybersecurity technology, suggestions for employee cybersecurity training, and breach or incident response plans. The CISO is ultimately responsible for any cyberattacks.

To learn more about information security visit:

brainly.com/question/6019784

#SPJ4

7 0
1 year ago
Read 2 more answers
Plz answer me will mark as brainliest ​
Stells [14]

Answer:

And you'r answer is

Explanation:

C.

a bunch  of grapes.                   a pack of cards.

a group  of crows                      a flock of sheep

D.

1.The burglary happened at midnight.

2.Their arrival was delayed.

Pls mark me as brainliest......

please

4 0
3 years ago
Which word in the sentence is a proper adjective?
alexira [117]
A, Cuban, is the answer your looking for
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement best describes the effect of Dorsey pulling the lever only once?
    7·2 answers
  • Which shortcut key in Microsoft Word 2016 will launch Spell Checker?
    14·2 answers
  • Giving Brainliest.
    13·2 answers
  • When the speaker in edgar allan poe’s “the raven” hears tapping on his door, he hesitates. why does he wait before opening the d
    11·2 answers
  • PLEASE HELP MEEE
    6·1 answer
  • Which of the following best explains the strategy Truth uses in the second
    5·2 answers
  • Select the word that best completes the following sentence:
    14·2 answers
  • Kayla is learning about ecology and made a study chart.
    12·1 answer
  • Both Candy and Crooks become interested in being partners in George and Lennie's dream of having their own farm. What literary e
    11·2 answers
  • Read the instruction first and then answer.<br><br><br> I need help guys help me..
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!