In this area, you want to focus on which hardware, application, personnel, or department(s) will be impacted by the security policy. For instance, what type of personal devices are allowed on the network and when? Must the personnel receive formal approval before using such devices on the network? What kind of activity is allowed on a personal device? Who is responsible for granting the permission to use a device on the network?

Answers

Answer 1

The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

What devices do BYOD have?

BYOD is known to be Personal devices such as smartphones that organizations often gives permission for employees that are working from home so as to be able to have a flexible schedule and others.

Therefore, The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

Learn more about personal device from

https://brainly.com/question/4457705

#SPJ1


Related Questions

2. What is the importance of ethics in emerging technologies?

Answers

Answer:

The importance of ethics in emerging technologies employ speculative data about future aspects such as items, applications, and consequences This help us make more informed moral judgments about and prescriptions for research

I need help including my other one I posted

Answers

Answer:

2. I like the form of it, I like the porportion of it.

3. I dont know what a purpose of this maybe it a person wearing a tuexdo stepping out of his house or something.

4. Another thing that would work well is texture.

what is the input for air cooler computer science​

Answers

Answer:

cooling

Explanation:

Air cooling is a process of lowering air temperature by dissipating heat. It provides increased air flow and reduced temperatures with the use of cooling fins, fans or finned coils that move the heat out of a casing such as a computer …

An example of a processing device would be

Answers

Answer:

Central processing unit (CPU) Graphics processing unit (GPU) Motherboard. Network card.

Explanation:

as my study I know this answer I hope it will be help full

Network card, Graphics processing unit, Motherboard, Central Processing unit, Digital Signal Processor, the list goes on.

In java language I want the code

Answers

Answer:

code was too long to paste here, attached below

HELP ME PASS!
Type the correct answer in the box. Spell all words correctly.
Nathan is creating a presentation for the employees at his office. Which media element should he use in the navigational buttons and menus in his presentation?
Nathan should use text or BLANK elements for the navigational buttons and menus in his presentation.

Answers

Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

What is an Action Button?

An action button is known to be an object that can be seen on a slide that helps one to be able to clicked or pointed to anything on a presentation.

Note that they are often used in self-running presentations and as such, Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

Learn more about presentation from

https://brainly.com/question/24653274

#SPJ1

What will be the output of the following code snippet?

Answers

Answer:

D

Explanation:

Its gonna be of the class integer.

Question 1 of 10
Which abbreviation is used to describe one type of long-term computer
memory?
O A. SCRAM
O B. DRAM
O C. ROM
O D. RAM

Answers

Answer:

C) ROM

Explanation:

In a computer, RAM is the short term memory. On the other side, ROM is the long term memory. Other examples of long term memory: Hard disk or SDD. Rest all of the options - SCRAM, DRAM, RAM are memory chips.

Answer:

C. ROM

Explanation:

The image was provided for explanation.

Hoped it helped.

c. What are the four basic operations in a computer? Define each of them wit help of block diagram.

Answers

Answer:Answer: At a fundamental level, computers operate through these four functions: input, output, processing, and storage.

Explanation:  Input is something entered into a machine or other system, the act of entering data or other information, or input can also describe giving one's help, advice or thoughts.

Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered.

An example of process is the steps taken by someone to clean a kitchen. An example of process is a collection of action items to be decided on by government committees. noun.

A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.

Explanation:

Explain the working operation of Wi-Fi and hotspots in provision of broadband services

Answers

╭── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╮

Hello, This is My explanation!

-----------------------------------------------------

A WiFi hotspot is a location that has been provided to give users the opportunity to use their devices away from their homes. These hotspots became popular over a decades ago at eating establishments such as cafes and are now found anywhere people wish to use them. (malls, airports,hotels,stores,restaurants,etc).

-----------------------------------------------------

Hope this Helped!

╰── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╯

Question 9
The district purchases a web resource for the elementary campuses, but you
want to use it with your 9th grade students who need remediation. This would be
allowed because the district has extra licenses.
O True
False?

Answers

i think this is false im not sure tho

A license agreement specifies the number of
devices on which you can install the product, any
dates of expiration, and other restrictions. True or false?

Answers

The statement that a license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions is true.

What is a license agreement?

A license agreement is a formal agreement that is given to a person to do or use something.

It is a legal contract between people or government and a person to authorize over any product.

Thus, the given statement is true.

Learn more about license agreement

https://brainly.com/question/14681311

#SPJ1

How far should you sit from your computer screen?
PLS ANSWEER ASAP

6 to 12 inches

12 to 18 inches

18 to 24 inches

24 to 30 inches

Answers

im sorry but none of these THE REAL ANSWER IS 16 to 30 inches
Yes the answer is 16 to 30 inches
Non of these are the answer

Explain the stages of the evolution of the idea of IDS and its importance of security, military and examine the importance of intrusion detection systems and categories classifications, and where can put IDS to reduce the risk to the network.

Answers

Intrusion detection systems (IDS) is a software type that is used to check for violations of policy or any other malicious activity. IDS detects and prevents unauthorized activities.

What is IDS?

Intrusion detection systems (IDS) is the technological system that is built to check for any suspicious and unauthorized activities. They detect the network system and the system logs.

The unauthorized and suspicious things are scanned and made an alert. It is very crucial in many fields as many documented and private items are needed to be protected.

Therefore, IDS can be of various types like host, network, perimeter, and VM.

Learn more about IDS here:

https://brainly.com/question/20709626

#SPJ1

what are some answers about computer languages​

Answers

Question: What is program execution?

Answer: Program execution is the process of carrying out instructions innate to the program by the computer. Before execution, the computer program is required to be loaded into the memory (RAM) of the computer.

AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.

connecting to unauthorized devices through the network

going onto unauthorized sites or downloading certain content

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Answers

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

What is AUP?

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

How does an AUP regulates users?

Most AUPs imply:

Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.

Learn more about AUP in: https://brainly.com/question/9509517

#SPJ1

Answer:

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Explanation:

Identify the following as a Program, Sub-Project, or Portfolio: (2)
a) Obtaining a Masters degree. Sub Project or Program
b) Pakistan’s Nuclear Weapons Program. Program
c) Developing the database of a remote payment system. Sub Project
d) Construction of cars in an automobile company. Portfolio

Answers

Answer:

obtaining a master degree.sub project or program

Suppose you want to pick the most reliable data storage option possible. What would you choose?
cloud storage
solid-state drive
optical disc
USB flash drive

Answers

Answer:

USB flash drive

Explanation:

A USB flash drive can store important files and data backups, carry favorite settings or applications, run diagnostics to troubleshoot computer problems or launch an OS from a bootable USB. The drives support Microsoft Windows, Linux, MacOS, different flavors of Linux and many BIOS boot ROMs.

Which output returns the Boolean value FALSE? A. 3 B. 2 C. 1 D. 0

Answers

Answer:

D) 0

Explanation:

True - 1

False - 0

Choose the correct term to complete the sentence.

For most operating systems, the _______ function returns the number of seconds after January 1, 1970, 0:00 UTC.


O localtime()

O time()

O epoch()

Answers

Answer:

time() or time.time()

Explanation:

The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:

>>> time.time()

1652747529.0429285

For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,

What is the time() function?

In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.

The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an  epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.

Therefore, the correct option is B.

Learn more about time() function here:

https://brainly.com/question/12174888

#SPJ2

Which is an example of a foley effect?

Answers

Answer:

Foley artists reproduce everyday sounds like footsteps, doors opening and closing, wind blowing, glass breaking, and other ambient noise.

Question 4 of 10
To find an image's____
count the number of pixels across each inch of the image.
A. binary value
B. bitmap
C. pixel density
D. RGB value

Answers

C. pixel density ii belive

When replacing a system board for an OEM system, what are the recommended steps to take? Select two options that apply.

Answers

When replacing a system board for an OEM system, the recommended steps are A. Run Easy Restore to install the OEM ID. If Easy Restore fails, manually reinstall the OEM ID module while the manufacturing mode is still enabled/detected on the replaced system board.

B. Replace the system board, verify the server boots fully before reinstalling the OEM identity (ID) module.

What is OEM system?

OEM means original equipment manufactures. OEM makes computer system and products that are used by another company's end product.

Thus, the correct options are A and B.

Learn more about OEM system

https://brainly.com/question/23988969

#SPJ1

.....................................................

Answers

Answer:

i think its, a. sequence

Explanation:

i could be wrong, if i am, i am sorry

What is one way that Accenture can ensure that the Cloud is secure for a client?

Answers

One of the ways through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

What is a cloud?

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources (physical hardware) through virtualization and over the Internet, so as to enable the storage of files and documents virtually.

In this context, a way through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

A computer has 32-bit virtual addresses and 4-KB pages. The program and data together fit in the lowest page (0–4095) The stack fits in the highest page.
1.How many entries are needed in the page table if traditional (one-level) paging is used?
2.How many page table entries are needed for two-level paging, with 10 bits in each part?

Answers

The numbers of entries needed is that:

For a one-level page table, one needs  232/212 or 1M pages needed.  Note that the page table must have 1M entries.

Can I run a 32-bit virtual machine using a 64-bit OS?

Others are:

For two-level paging, the main page table must have 1K entries, each have to points to a second page table. Note that only two of these are to be used.

Therefore, in full, only three page table entries are said to be needed, where one in the top-level table and another in each of the lower-level tables.

Note that one can install a 32-bit virtual machine in 64-bit Windows 10 system as it is very possible as long as the processor aids Virtualization Technology (VT).

Learn more about computer from

https://brainly.com/question/24540334

#SPJ1

Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger, Second is larger, Numbers are equal?

Answers

The pseudocode of the program will ask of two numbers form the user, compare the numbers and print out statements depending on the result of the comparison.

What is a pseudocode?

Pseudocode is an informal way of programming description that does not require any strict programming language syntax. The pseudocode describes how the code will be written and structured.

Therefore, the pseudocode follows the structure below

Ask the user for two numbersUse the greater than and equals to operator to check if any number is greater than the other or they are the sameFinally, we print the statements: First is larger, second is larger or numbers are equal depending on your result in comparison of the numbers.

learn more on pseudocode here: https://brainly.com/question/14101532

#SPJ1

What are the operations in the machine cycle ?

Answers

The cycle consists of three standard steps: fetch, decode and execute.

Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop? ​

Answers

The option that is an event is known to be clicking a mouse button.

What is a computer event?

An event, in a computing context, is known to be any kind of action that aim to know or  is identified by a program and has a good importance for system hardware or software.

Events  examples  keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.

Learn more about  program from

https://brainly.com/question/1538272

#SPJ1

30 POINTS!

Which of the following describes an iteration in a computer program?

a set of instructions that causes a number to be printed

a set of instructions that causes the program to stop running

a set of instructions that can be executed multiple times

a set of instructions that does not execute any code​

Answers

The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times.

What tells about an iteration in a computer program?

In computer programming, the term iterative is known to be the act where product design or its application is made better via consistent review and testing.

Therefore saying that The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times is correct.

Learn more about iteration from

https://brainly.com/question/25754804

#SPJ1

Answer:

C. a set of instructions that can be executed multiple times

Explanation:

Other Questions
Please help me with Proportions Select the correct answer from each drop-down menu. thermal energy moves from a to b by . heat transfer will continue until the liquid in b reaches temperature as the liquid in a. What does President Lincoln urge members of the audience to do? *A. join the causeB.visit the cemetery every yearC.choose a sideANSWER ASAP!!! PLEASE Which expression shows 35+ 15 written as a product of two factors?7(5+2) 5(6 + 3)5(7 + 3)7(5+3)? 4. At a local print shop, 25 copies cost $1.50. At this rate, how much would 60 copies cost? Find the surface area and lateral area of the following three prisms. Be sure to show all of your work. Match the stage to the virtue that is obtained at the end of each stage as per Erickson's psychosocial theory. Trust vs. Mistrust Generativity vs. Stagnation Identity vs. Role Confusion Industry vs. Guilt fidelity 1 purpose dare hope (9x^2+5x^2+11x)+(-2x^3+9x-8x^2) Simplify the expression using properties of exponents. 10a-8b-2/4a3b5 0.0030 x 8.65=report answer to correct number of significant figures. Multiply.[tex]\frac{\sqrt{2}}{6}cis (\frac{3\pi }{5})[/tex][tex]\frac{\sqrt{6}}{4}cis (\frac{2\pi }{3})[/tex]A.[tex]\frac{\sqrt{3}}{12}cis(\frac{19\pi }{15})[/tex]B. [tex]\frac{\sqrt{3}}{12}cis(\frac{2\pi }{5})[/tex]C. [tex]\frac{\sqrt{2}}{8}cis(\frac{2\pi }{5})[/tex]D. [tex]\frac{\sqrt{2}}{8}cis(\frac{19\pi }{15})[/tex] Compare the level of energy of radio and microwaves when compared to other waves on the spectrum. Questions are on the picture, a-e. In the 1800s mass production led to In Syria, which of the following statements best explains the reaction of the Saud family towards a civil unrest?A) the United Nations pushed for Democratic elections in SyriaB) the sides agreed to relinquish power and phrasesC) the Assads tried to Stamp Out citizens' rebellionsD) the United States removed the Assads from Power In your own words define, The Holocaust Triangle ABC is transformed to form triangle ABC.A is at (3, 1), B is at (1, 8), and C is at (7, 2).Which transformation happened to ABC to form ABC?Drag and drop the the correct answers into each box to complete the sentence. ABC____, _____ is Response area Response area to form ABC .Options:1. Rotated Clockwise2. Translated3. Dilated4. Reflected5. 90 about the origin6. 180 about the origin7. 270 about the origin8. across the x-axis9. across the y-axis10. across the line y = x11. 1 unit right 2 units down12. 2 units right 1 unit down13. 4 units left 3 units up14. by a factor of 215. by a factor of 316. by a factor of 5 Choose the correct form of the possessive adjective to complete the sentence, keeping in mind that the subject and the possessor are the same. 1. Tienes cuatro clases en UNM, no? ____ clases son difciles?A. SuB. TusC. NuestraD. Mis Which statement would most likely reflect the reason ancient mythologies are still so much a part of our culture today?Ancient myths seek to understand aspects of the world we still cannot comprehend today.Ancient myths explore the nature of humanity and address questions of life and death.Ancient myths are full of violence and passion which people enjoy.Ancient myths are told in a story format and are therefore easy to read. which sentence should be included in the summary between sentences 1 and 2