Microsoft Office Access 365/2019 A Skil
Microsoft Office Access 365/2019 A Skil
10th Edition
ISBN: 9780357012826
Author: ANDREWS
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 16, Problem 1TC

a.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the party of the company, which was held on 4 July, should be kept at which security level.

Solution:

The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.

b.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.

Solution:

The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.

c.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of resumes of different people, who applied in the company, should be kept at which security level.

Solution: 

The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.

d.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the payroll spreadsheet should be kept at which security level.

Solution: 

The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.

e.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of job openings details of the company should be kept at which security level.

Solution: 

The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
This battle room is focused on entry level tasks for a network analyst where you will be given trials and reconnaissance, sensor tuning, log aggregation, SIEM queries, and network analysis.   For this week’s project, complete the following tasks:   From your Project Ares portal, LOG IN Click on LAUNCH GAME. Select the region NORTH AMERICA Click on Battle School Under the BATTLE SCHOOL pop-up window, click on START TRAINING. Under the BATTLE ROOMS tile, click on ENTER. Under the NETWORK ANALYST tile, click on PLAY. Wait for the Battle Room to load. While loading, the BATTLE ROOM button will display red. Once the Battle Room is loaded, the BATTLE ROOM button will turn yellow and the center of the disk display will indicate CONNECTED. Click on the BATTLE ROOM button to enter the Battle Room. Below the TASKS folder, make sure you click on INSTRUCTIONS to download the Network Analyst Fundamentals material. In the Battle Room, under the TASKS menu select task INTRUSION DETECTION. Complete…
Create a relationship between the common field (Technician Number) of the two tables. Make sure that each client must have 1 and only 1 technician assigned, and each technician can have multiple clients. 2. Create a query to show the Client Number, Client Name, Billed, Paid for clients in Anderson city. Save the query. 3. Create a query to show the Technician Number, Last Name, First Name, YTD Earnings for technicians whose Hourly Rate is greater than or equal to 30. Save the query. 4. Create a query to show Client Number, Client Name, Billed, Paid for clients whose technician number is 22 and whose Billed is over 300. Save the query. 5. Create a query to show the Technician Number, Last Name, First Name, Client Number, Client Name for clients whose technician number 23. Save the query. 6. Create a query to show the Technician Number, Last Name, First Name, Client Number, Client Name for clients whose technician number 23 or 29. Save the query Help please Microsoft office access
Dijkstra's Algorithm (part 1).  Consider the network shown below, and Dijkstra’s link-state algorithm. Here, we are interested in computing the least cost path from node E (note: the start node here is E) to all other nodes using Dijkstra's algorithm. Using the algorithm statement used in the textbook and its visual representation, complete the "Step 0" row in the table below showing the link state algorithm’s execution by matching the table entries (i), (ii), (iii), and (iv) with their values.  Write down your final [correct] answer, as you‘ll need it for the next question.
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning