a.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the party of the company, which was held on 4 July, should be kept at which security level.
Solution:
The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.
b.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.
Solution:
The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.
c.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of resumes of different people, who applied in the company, should be kept at which security level.
Solution:Â
The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.
d.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the payroll spreadsheet should be kept at which security level.
Solution:Â
The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.
e.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of job openings details of the company should be kept at which security level.
Solution:Â
The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.
Want to see more full solutions like this?
Chapter 16 Solutions
COMPTIA A+ GUIDE TO IT TECH SUPPORT
- A Solve each member force of the truss shown below. F 30 kN E 30 kN 3 m 3 m D C B 4 m 4 m 4 m 4 marrow_forward5:11 PM Fri Dec 13 Tt Problem 8 should be answered as a triple quoted comment after the code PROBLEM G. Put your name and assignment information here. The Bells Edgar Allen Poe HEAR the sledges with the bells. Siver bells! What a world of merriment their melody foretels How they tinkle, tinkle, tinkle, In the icy air of night While the stars, that oversprinkle All the heavens, seem to twinkle With a crystalline delight Keeping time, time, time. In a sort of Runic rhyme. To the tintinnabulation that so musically wells From the bells, bells, bells, bells, Bells, bells, bells From the jingling and the tinkling of the bells Hear the mellow wedding bels Golden bells! What a world of happiness their harmony foretells Through the balmy air of night How they ring out their delight! From the molten-golden notes. And all in tune. What a liquid ditty floats To the turtle-dove that stens, while she gloats On the moon! Oh, from out the sounding cells. What a gush of euphony voluminously wells! How…arrow_forward1. Could you see yourself making a career out of being a System Analyst? why? 2. What is one question you have about being a system analyst still or the system analysis and design process?arrow_forward
- Please, don't include lots of explanation.arrow_forwardI need help writing the recursive function called powerlist that computes the power of n (given as a parameter) of the numbers in a list. I need to use map. An example of what I have to do could be powerlist([6,4,3],5)=[6^5,4^5,3^5].arrow_forwardCan you show me how to redesign the Milwaukee Rep website using HTML and CSS using Sublime Text?arrow_forward
- Problem 3 A radar speed gun is a device used in law-enforceme✗measure the speed of moving vehicles in miles per hour. The measured speeds are supposed to be stored in a file, one number per line, as follows: 65.6 70.2 54.9 Unfortunately, due to an intermittent fault, occasionally multiple numbers are written on a single line as follows: 73.2 65.6 69.8 Furthermore, occasionally the radar gun outputs a single stray character such as: 67.9z, 6$4.9, or a3.9, to illustrate just a few. Given a file that has radar speed gun readings, write a function averageSpeed() to calculate the average of the numbers in the file. Your code must adhere to the following specifications: a. Prompt the user for the name of the input file to process. When the user enters a nonexistent file name, give the user a second chance. After two wrong entries in a row, quit the program with an appropriate message. b. Ignore numbers containing stray characters. Ignore any reading for slow vehicles moving at 2 miles per…arrow_forwardWhich internet core technology provides dedicated bandwidth to each user?arrow_forwardCan you show me how to make a link of a CSS file and add it to an HTML file using Sublime Text?arrow_forward
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage Learning