Bundle: Comptia A+ Guide To It Technical Support, 10th + Mindtap, 1 Term Printed Access Card
Bundle: Comptia A+ Guide To It Technical Support, 10th + Mindtap, 1 Term Printed Access Card
10th Edition
ISBN: 9780357012789
Author: Jean Andrews, Joy Dark, Jill West
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 16, Problem 1TC

a.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the party of the company, which was held on 4 July, should be kept at which security level.

Solution:

The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.

b.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.

Solution:

The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.

c.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of resumes of different people, who applied in the company, should be kept at which security level.

Solution: 

The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.

d.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the payroll spreadsheet should be kept at which security level.

Solution: 

The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.

e.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of job openings details of the company should be kept at which security level.

Solution: 

The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Can you check if my explation is correct: Challenge: Assume that the assigned network addresses are correct. Can you deduce (guess) what the network subnet masks are?  Explain while providing subnet mask bits for each subnet mask.  [Hint:  Look at the addresses in binary and consider the host ids]     To assume that the network addresses are correct, we take a look at the network ID and IP addresses. Take 20.0.0.0/8, we have an /8 prefix which is Class A, that provide us with 255.0.0.0. This means that there are 24 host bits while the network bits are 8. When compared to the IP address 20.255.0.7, we can perform an additional operation with the subnet mask giving us 20.0.0.0. The same happened with 20.0.0.89, which we also got 20.0.0.0. Therefore, these two IP addresses fall within the respective /8 subnet. For 200.100.10.0/30, the /30 is Class C with a subnet mask of 255.255.255.252, meaning 30 network bits and only two host bits. When applying the subnet mask and the IP addresses…
It is possible to sort an array of n values using pipeline of n filter processes.The first process inputs all the values one at a time, keep the minimum, and passes the others on to the next process. Each filter does the same thing; it receives a stream of values from the previous process, keep the smallest, and passes the others to the next process. Assume each process has local storage for only two values--- the next input value and the minimum it has seen so far. (a) Developcode for filter processes. Declare the channels and use asynchronous message passing. Hint:Define an array of channels value[n] (int), and a set of filter processes Filter[i = 0 ton-1]. Each process Filter[i] (where 0 <= i <= n-2) receives a stream of integers through channelvalue[i], keeps the smallest, and sends all other integers to channel value[i+1]. The last processFilter[n-1] receives only one integer through channel value[n-1] and does not need to send anyinteger further.
It is possible to sort an array of n values using pipeline of n filter processes.The first process inputs all the values one at a time, keep the minimum, and passes the others on to the next process. Each filter does the same thing; it receives a stream of values from the previous process, keep the smallest, and passes the others to the next process. Assume each process has local storage for only two values--- the next input value and the minimum it has seen so far. (a) Developcode for filter processes. Declare the channels and use asynchronous message passing. Hint:Define an array of channels value[n] (int), and a set of filter processes Filter[i = 0 ton-1]. Each process Filter[i] (where 0 <= i <= n-2) receives a stream of integers through channelvalue[i], keeps the smallest, and sends all other integers to channel value[i+1]. The last processFilter[n-1] receives only one integer through channel value[n-1] and does not need to send anyinteger further.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning