Microsoft Office Access 365/2019 A Skil
Microsoft Office Access 365/2019 A Skil
10th Edition
ISBN: 9780357012826
Author: ANDREWS
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 16, Problem 1TC

a.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the party of the company, which was held on 4 July, should be kept at which security level.

Solution:

The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.

b.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.

Solution:

The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.

c.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of resumes of different people, who applied in the company, should be kept at which security level.

Solution: 

The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.

d.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the payroll spreadsheet should be kept at which security level.

Solution: 

The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.

e.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of job openings details of the company should be kept at which security level.

Solution: 

The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
S A B D FL I C J E G H T K L Figure 1: Search tree 1. Uninformed search algorithms (6 points) Based on the search tree in Figure 1, provide the trace to find a path from the start node S to a goal node T for the following three uninformed search algorithms. When a node has multiple successors, use the left-to-right convention. a. Depth first search (2 points) b. Breadth first search (2 points) c. Iterative deepening search (2 points)
We want to get an idea of how many tickets we have and what our issues are. Print the ticket ID number, ticket description, ticket priority, ticket status, and, if the information is available, employee first name assigned to it for our records. Include all tickets regardless of whether they have been assigned to an employee or not. Sort it alphabetically by ticket status, and then numerically by ticket ID, with the lower ticket IDs on top.
Figure 1 shows an ASM chart representing the operation of a controller. Stateassignments for each state are indicated in square brackets for [Q1, Q0].Using the ASM design technique:(a) Produce a State Transition Table from the ASM Chart in Figure 1.(b) Extract minimised Boolean expressions from your state transition tablefor Q1, Q0, DISPATCH and REJECT. Show all your working.(c) Implement your design using AND/OR/NOT logic gates and risingedgetriggered D-type Flip Flops. Your answer should include a circuitschematic.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning