All of the following are elements of a data governance policy except identifying: O where information can be distributed O how data resources should be secured. O the structure of the company's database. O who is responsible for updating and maintaining information O which users and organizational units can share information

Answers

Answer 1

All of the following are elements of a data governance policy except identifying the structure of the company's database.

What is data governance policy?

Data governance or DG policy is a policy to manage and ensure the process of data in the company system include the availability, integrity, security, and usability of data.

The all option have a characteristic of data governance policy except for the structure of the company's database which does not have a concern in integrity and security of data. So, the correct option is the structure of the company's database.

Learn more about data governance here:

brainly.com/question/30020152

#SPJ4


Related Questions

For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False

Answers

False, sas is hold more then sata disks do

The given statement is false that, SAS disks are preferable over SATA disks for business systems or servers accessed continuously.

What is the SATA disks?

The majority of desktop and laptop hard drives use the SATA (or Serial Advanced Technology Attachment) interface, which was first introduced in 2003. Despite being rotary hard drives with spinning platters and a moving needle that writes data to successive sectors on each platter, they are known as SATA hard drives.

Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

Therefore, it is false.

Learn more about the SAS disks, refer to:

https://brainly.com/question/28310028

#SPJ2

Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in the file. Which shortcut can Brenda use to find this information quickly?

Answers

Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.

What are three examples of information technologies you use in your everyday life? Which do you consider to be the most important to you on a daily basis and why?

Answers

Although IT is crucial to many other daily tasks, other examples of IT systems include the internet, mobile phone networks, broadcast radio and TV systems.

What information technologies use in your everyday life?

Information technology has made it possible for people to connect with one another more quickly, simply, and affordably than ever before. Texting and making video calls are so easy these days. There are numerous apps available online that provide these services.

Therefore, radio and phone equipment for video conferencing. Individual computers, For handling goal-setting and performance reviews, use performance management software.

Learn more about information technologies here:

https://brainly.com/question/14426682

#SPJ1

Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used for a variable number of iterations. C. It uses an integer counter; not a loop condition. D. It uses a loop condition; not an integer counter. E. Only consider this option if you checked alternative D above: It checks the loop condition a the BEGINNING of the loop, F. Only consider this option if you checked alternative D above: It checks the loop condition a the END of the loop,

Answers

Answer:

A and C

Explanation:

The for next loop is used for a fixed number of iterations which is usually indicated in the syntax. It uses a counter that increments on each iteration. The loop terminates when the counter reaches the number of initially specified iterations. It is different from a while loop which depends on a specified condition evaluating to the Boolean 'true'.

Choose the tag required for each stated goal.

To style text as larger than adjacent text:








To style text as bold:








To style text as italicized:








To style text as small:

Answers

capslockbolditalicscapslock

help Which of the following triangles can be proven similar through AA?
Question 1 options:

A)

image

B)

image

Answers

A as in Ate my food ya know

You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice that the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client

Answers

Answer: • Control access to the work area with locking doors and card readers.

• Relocate the switch to the locked server closet

Explanation:

Based on the information given, the security-related recommendations that should be made to this client include:

• Relocate the switch to the locked server closet: Since the organization's network switch is kept in an empty cubicle that is adjacent to the office manager's workspace, it can be easily accessible by anyone and this could lead to an external attack. Therefore, it should be moved to the locked server closet to prevent external attack.

• Control access to the work area with locking doors and card readers- Thus us necessary so that the work area won't be accessible to just anybody.

Which line of code will create an instance of the pet class?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

myPetA = pet('dog', 'Spot'), myPetA = pet(self, 'dog', 'Spot'), myPetA = new pet('dog', 'Spot'), myPetA .pet() = 'dog', 'Spot'

Answers

Answer:

myPetA = pet(self, 'dog', 'Spot')

Explanation:

I mite be wrong

The line of code that will create an instance of the pet class is myPetA = pet (self, 'dog', 'Spot'). Option B is correct.

What is code?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples.

Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code (Cascading Style Sheets)

Therefore Option B is correct.

Learn more about code:

https://brainly.com/question/17204194

#SPJ2

For what purpose is IT used in business?

Answers

Answer:

manufacturing

improving

customer care

transportation

human resource management

Explanation:

business communication use technology to improve their services or products as a way of gaining competitive advantage.

You are a part-time manager for The Mobile Vegan, a food truck catering to vegan diners in Portland, Oregon. Jessica Rosen, the owner of the business, wants to expand by adding other food trucks in Portland and the surrounding area. Whether she purchases new trucks or takes over an existing food truck business with an established clientele, she needs a loan to cover the cost of the trucks. She has asked for your help updating the workbook she created to analyze the loan information and forecast sales. Switch to the Loan Scenarios worksheet, and then calculate the monthly payment for the Add 1 Truck scenario as follows:
a. In cell D11, enter a formula using the PMT function to calculate the monthly payment for a loan.
b. Use the inputs listed under the Add 1 Truck loan scenario in cells D5, D7, and D9. (Hint: The result will be displayed as a negative number to reflect the negative cash flow of a loan payment.)

Answers

Answer:

i acc dont know

Explanation:

srry

what is the meaning of url

Answers

Answer:

it stands for Uniform Resource Locator.

Explanation:

Uniform Resource Locator: a location or address identifying where documents can be found on the internet.

Write a program that will have Tracy draw a stretched out slinky. The slinky should have: Five rings Each circle should have a radius of 35 Tracy should move forward 40 pixels after every circle

Answers

Solution :

The Tracy commands :

main.py

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access the Customization option to create the new shortcut. Which two tabs should Jason select to place the Print Preview shortcut on the worksheet toolbar?

Answers

Answer:

New Tab (Custom) and New Group (Custom)

Explanation:

In order to accomplish this Jason needs to use New Tab (Custom) and New Group (Custom). The New Tab (Custom) will allow Jason to add a new tab with the Print Preview shortcut as a brand new tab in the software. Then using the New Group (Custom) tab, Jason can group the Print Preview shortcut with the worksheet toolbar so that it appears as part of the original toolbar with the rest of the tools available in the toolbar.

What is CPU
and it's functions

Answers

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer

Explanation:

hope it is helpful to you

The numeric keys on a keyboard or calculator are referred to as a:
o Ten keypad
o Number keypad
o Keypad
o Number and symbols keypad

Answers

Answer:

Ten keypad

Explanation:

I did it

What file format is best to give a printer when working with Adobe InDesign?


GIF

TIFF

HTML

IDML

Answers

Answer:

TIFF

Explanation:

GIFs are animated image files, and printers can't print animations

TIFFs are basically image files

HTML is a coding file, you were to print it, it would print the HTML text of the image

IDML is an XML representation of an InDesign document or components, if you were to print it, its outcome would be basically the same as printing an HTML file.

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent

Answers

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

solve each ratio 35:7​

Answers

Answer:

5:1

Explanation:

Divide each side by 7

9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N

Please helppp

Answers

Answer:

See Explanation

Explanation:

The question lacks so many details, as the array type and the programming language is not stated.

Assume that, it is Java:

The rule to follow is:

Data-Type[][]Array-Name = new Data-type[rows][columns]

If the given information is for an array of type integer, the code will be;

int[][] N = new int[4][5]

Where

N = Array-Name

int = Data-type

4 and 5 are the dimensions of the array

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

please help thank u!!!!!

Answers

Answer:

i believe you can change slides with the arrow keys not entirely sure though

Explanation:

Answer:

using the arrows

pressing space

and clicking the mouse

Explanation:

Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches are installed. Which solution should you use

Answers

Answer: Network access control (NAC)

Explanation:

The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.

In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.

What are the available Advanced Calendar options? Check all that apply.

1. Add new contacts.
2. Set default reminders.
3. Change display options.
4.Add additional time zones.
5.Configure free/busy options.
6. Add new holidays and calendars.
7. Edit and set work times and hours.

Answers

Answer:B C D E F G

Explanation:EDGE 2021

Answer

every except the first one

Explanation:

can rank u r guys in rocket leagye

Answers

Ha ha ha ha ha ha ha ha

Describe the home keys

Answers

The home keys are where you place your fingers when you are learning to type. The home keys include F, D, S, and A on the left of the keyboard, and J, K, L, and ; (semicolon) on the right of the keyboard.
The home row keys are the row of keys on the computer keyboard you’re fingers rest on when not typing.

please help me with computing!
the question is:
solve the following algorithm in pseudocode "the algorithm is required to prepare a teacher's payroll. For them, the hours worked and the price per hour are taken into account. place the input data and the output data.​

Answers

Answer:

ok i help

Explanation:

List four things that must be taken into consideration when evaluating different resources of information (and explain ANY ONE from the list)​

Answers

Answer:

objectivitycurrencyaccuracyauthority

Explanation:

authority:is important to know if the information provided is reliable or not.

plz help me I have to submit the work before the day ends
13. (a) State one area where computers are used.
(2 marks)
(b) Give any two advantages of using computers in this area
(4 marks)
(c) Explain three effects of computer technology in the following areas:
(i) Job opportunities
(3marks)

Answers

Answer:

13. (a) One area where computers are used is in the creation of a record of auxiliary workers, doctors, nurses, patients, vendors, and payments that can be easily retrieved at an hospital

(b) Two advantages of using computers in an hospital are;

1) The ability to easily access the health record of a patient by a member of staff involved in treating the patient from any location

2) The reduction in the number of physical files and document kept at the counter or record storage which takes up more space as new patients are registered, even when the number of active patients remains the same

(c) Three effects of computer technology in the following area are;

(i) Job opportunities

1) The introduction of the desktop computer, increased the number of job opportunities in desktop publishing, administrative assistance and secretarial role

2) Computer technology has made more people able to work from home

3) Computer applications use with computer technology and developed to work with production machines has created a large number of machine operator job opportunities

Explanation:

What does input allow a computer to do

Answers

In computer science, the general meaning of input is to provide or give something to the computer, in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.
Other Questions
Frank's daughter jenna is sick. They visit the hospital and the doctor says that if jenna does not get a certain medicine, she will probably die. Unfortunately, frank cannot afford the medicine. He notices recent improvements to the hospital and suspects it must be making a lot of money by raising the prices of medicines. On his way out, frank notices an open drawer stuffed with vials full of the medicine jenna needs. He does not see anyone around and knows he could take some of the medicine without anyone noticing. What would a kantian deontologist say that frank should do?. whcich is most closely with penitentiary What space and color techniques are used in this painting that make it surreal? (3 points)A. Abstraction of movement and colorB. Abstraction of scale and color C. Perspective and ContrastD. Perspective and Value When can the buyer reject the goods delivered? Father spends 3_4parts of his monthly income on food and parts 1_8your education. On which heading does he spend more money? Can super PACs donate to candidates? What is the value of x and y? Show all work. Write 2 paragraphs about Nhamo from the setting sun and the rolling world 1) Insert the missing code in the following code fragment. This fragment is intended to call the Vessel class's method. public class Vessel { . . . public void set VesselClass(double vesselLength) { . . . } } public class SpeedBoat extends Vessel { . . . public SpeedBoat() { _______________; } } a) SpeedBoat.vesselLength(26.0); b) Vessel.vesselLength(26.0); c) this.vesselLength(26.0); d) vesselLength(26.0); What are the 5 steps to solve an equation? which of the following listings is most advantageous to the broker? a. exclusive right to sell b. exclusive agency listing How did Liu Bang come to power as the first Han emperor?He encouraged citizens to vote out their leader.He established peace treaties with Qin leaders.He gained support by improving Chinas roads.He led a peasant rebellion that defeated the Qin. How do you get rid of leg pain after sit-ups? The annual sales of home entertainment equipment in your area is $23 million. You want to capture 15% of the market. How much will you have to sell to achieve your goal? Show your work. Bacterial cells may be phagocytized and processed for presentation by ______is the fundamental mechanism that generates technological progress in "Schumpeter's Endogenous" growth model is taken from marx's circuit of capital. After applying the primer during a sculptured nail service: What does it mean when you say that scrum separates the what from the how? Provided below is the IR and 'H NMR for a compound having the molecular formula of C,H,O, Using this information, determine the degrees of unsaturation for this structure and solve and draw the structure responsible for these spectral data. To validate your answer, you need to assign the type of bond (ie, stretch) responsible for each peak highlighted by a box in the IR. You must also assign each 'H NMR peak (a)-(e) to the correct set of protons in your proposed structure. The integration for each peak has been provided for you. You must label the multiplicity observed for each peak. Is your structure consistent with all of this data? If not, chances are you do not have the correct structure, or the peaks have been assigned incorrectly. In your peer review, offer feedback concerning the accuracy of the submitted structures and spectral assignments. If you believe the answers are incorrect, then you need to provided explanation. In the end, you should all be getting the same correct structure. Please draw the final structure in the box provided underneath the NMR. TH NMR - for clarity, expansions have been provided for peaks that are not a singlets. Proposed Structure: Remember to assign it to the NMR per instructions. IR FREQUENCY TABLE (in wavenumber) Frequency Range (om ) Intensity Group A. Alky! C-H (stretching) Isopropy. -CH(CH), tert-Butyl, -C(CH) ( -5) and 2853-2002 1380-1385 1365-1370 1385-1395 - 1366 (m) and B. Alkenyl C-H(stretching) C- (stretching) R-CH-CH, m) (v) 3010-3095 1620-1600 085-1000 905-920 80-900 (6) (out of plane >C-H bondinga) and BCHCH cafe Esses se s8 s (8) 675-730 960-975 (6) (s) -3300 2100-2260 (8) () cle-RCH-CHR trans-RCH-CHR C. Alkyny! C H (stretching) C-C (stretching) D. Aromatic Ar-H(stretching) Aromatic substitution type (C-Hout-of-plane bendings) Monosubstituted o-Disubstituted m-Disubstituted -3030 and (very s) (very s) (s) 690-710 730-770 735-770 680-725 750-810 800-860 and (very s) (very s) 3590-3650 3200-3550 2500-3000 (sharp ) (broad, s) (broad, p-Disubstituted E. Alcohol, Phenols, and Carboxylic Acids O H (stretching) Alcohols, phenols (dilute solutions) Alcohols, phenols (hydrogen bonded) Carboxylic acids (hydrogen bonded) F. Aldehydes, Ketones, Esters, and Carboxylic Acids C-O (stretching) Aldehydes Ketones Esters Carboxylic acids Amides G. Amines N- H H. Nitriles CON 1630-1780 1690-1740 1680-1750 1735-1750 1710-1780 1630-1690 (s) (s) (s) (s) (s) (5) 3300-3500 (m) 2220-2260 (m) weak edium w - variatie p rowity Abbreviations strong m NMR CHEMICAL SHIFT TABLE (in ppm) CHARACTERISTIC PROTON CHEMICAL SHIFTS Type of Preton Structure Chemical Shin, ppm Cycopropane CHE Primary R-CH Secondary R-CH: Tertiary R; C-11 Vinylic C=C-H Acetylanic triple bond.CC-H Aromate Ar-H Benzyle Arc- Allylic CHCCH Fluorides H-C-F Chlorides H-C-a Bromides H-C-Br Iodides H-C- Alcohol H-C-OH Ethors H-C-OR 33-4 Esters RCOO-C- 3.7-4.1 Esters H-C-COOR 2-22 Acids H-C-COOH 2-26 Carbonyl Compounds H-C-C-0 2-27 Aldehydie R-CH-)C=0 9-10 Hydroxylic R-C-OH 1-55 Phenolie Ar-OH 4-12 Enolic C-C-OH 15-17 Carboxylic ROOOH 10.5-12 Amino RNH, 1-5 An investor deposited some money at 1.7% annual interest, and two equal but larger amounts at 2.3% and 2.4%. Thetotal amount invested was $25,000, and the total annual interest earned was $568. How much was invested at eachrate?At the rate 1.7%, $ was invested.