a.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the party of the company, which was held on 4 July, should be kept at which security level.
Solution:
The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.
b.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.
Solution:
The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.
c.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of resumes of different people, who applied in the company, should be kept at which security level.
Solution:Â
The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.
d.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the payroll spreadsheet should be kept at which security level.
Solution:Â
The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.
e.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of job openings details of the company should be kept at which security level.
Solution:Â
The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.
Want to see more full solutions like this?
Chapter 16 Solutions
Microsoft Office Access 365/2019 A Skil
- if the error in a closed-loop Servo motor system is zero, why does the motor Contimac ranning instead of stoppingarrow_forwardWhen the FCC added Color Television to the Industry Standards, they went with the system developed in the 1940s by Peter Goldman for CBS. Question 15 options: True False Part of the reason that many critics disliked 1950s gameshows was the fact that gameshows offered one of the few opportunities to see unscripted interactions with "real" (average/non-famous) people on television. Question 16 options: True False The Andy Griffith Show is an example of the "rural revival" shows that become enormously popular on 1960s American television. Question 19 options: True False During the Network Era, the hours before primetime each day were exclusively devoted to locally-produced programming, not programming dictated by an affiliate station's parent network. Question 20 options: True Falsearrow_forwardAlthough color television was not added to the industry standard until 1956, CBS had been broadcasting selected special events in color as early as 1950. Question 1 options: True False Two key factors in creating the Network Era of American television were the FCC licensing freeze and ______________. Question 4 options: The Quiz Show Scandals Habitual Viewing Operation Frontal Lobes Drop-In Viewing Least Objectionable Programming was designed to embrace the public service-oriented vision of using television to elevate mass culture and enrich viewers. Question 6 options: True False By the end of the 1950s, all three remaining networks (NBC, CBS, & ABC) were broadcasting their entire nightly programming schedule in full color. Question 9 options: True Falsearrow_forward
- 7. See the code below and solve the following. public class Test { public static void main(String[] args) { int result = 0; } result = fn(2,3); System.out.println("The result is: + result); // fn(x, 1) = x // fn(x, y) = fn(x, y-1) + 2, when y>1 public static int fn(int x, int y) { if (x <= 1) return x; else return fn(x, y-1) + 2; } } 7-1. This program has a bug that leads to infinite recursion. Modify fn(int x, int y) method to fix the problem. (2 point) 7-2. Manually trace the recursive call, fn(2,3) and show the output (step by step). (2 point) 7-3. Can you identify the Base Case in recursive method fn(int x, int y)? (1 point)arrow_forward6. See the code below and solve the following. import java.io.*; public class DataStream { } public static void main(String[] args) } DataOutputStream output = new DataOutputStream(new FileOutputStream("temp.dat")); output.writeUTF("Book1"); output.writeInt(85); output.writeUTF("Book2"); output.writeInt(125); output.writeUTF("Book3"); output.writeInt(70); output.close(); // ToDo: Read all data from temp.dat and print the data to the standard output (monitor) 6-1. This program has a compile error, and the message is “Unhandled exception type FileNotFoundException". How do you fix this error? (1 point) 6-2. Is FileNotFoundException a checked exception or an unchecked exception? (1 point) 6-3. What is the difference between checked exception and unchecked exception? (1 point) 6-4. Please complete the above program by reading all data from temp.dat and print the data to the standard output (monitor) by using System.out.print, System.out.println or System.out.printf method. (2 points)arrow_forwardWrite a program that reads a list of integers from input and determines if the list is a palindrome (values are identical from first to last and last to first). The input begins with an integer indicating the length of the list that follows. Assume the list will contain a maximum of 20 integers. Output "yes" if the list is a palindrome and "no" otherwise. The output ends with a newline. Hints: - use a for loop to populate the array based on the specified size (the first number entered) - use a for loop to check first value with last value, second value with second from end, etc. - if the values do not match, set a Boolean variable to flag which statement to output (yes or no) Ex: If the input is (remember to include spaces between the numbers): 6 1 5 9 9 5 1 the output is: yes Ex: If the input is: 5 1 2 3 4 5 the output is: C++ codingarrow_forward
- Design and draw a high-level "as-is" process diagram that illustrates a current process related to a product or service offered through the SSDCI.gov database.arrow_forwardCompare last-mile connections for connecting homes and businesses to the Internetarrow_forwardExplain wireless networking standardsarrow_forward
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage Learning




