1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o

n her computer that could be at risk of being stolen or breached?
Jorge is a writer for a local newspaper. He does not have an office and uses local cafes, etc. to write. He does use a tablet to access the newspaper's network. What type of data or information could Jorge have that could be at risk?

Wanda is a college professor at a local community college. She often works from her office and away from her home office at various locations when meeting with a student. She uses a tablet for checking e-mail and grading. Explain the type of data or information that Wanda has at risk?

Carl is a meter reader and travels over large areas of land everyday. He uses a laptop to check e-mail and connect to the company's network. What type of data might be stored on his laptop that could be at risk? What are ways he can protect the data?
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

You might be interested in
What services are used to help speed the development and deployment of internal custom applications?
PtichkaEL [24]

A, Protocol

because An application service provider (ASP) is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

7 0
3 years ago
Read 2 more answers
What are the four conditions to help determine whether a website is a good source for information?
Ratling [72]

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

3 0
2 years ago
I need help ASAP please and thank you!
hram777 [196]

Answer:

B) Sees failure as a way to get better.

Explanation:

Someone with a growth mindset sees failure as a way to get better. A growth mindset is one that typically do not see failure as a stunning block but rather as a way to get better and excel.

7 0
3 years ago
What is a very important difference there between the wiring of an electromechanical thermostat and an electronic programmable t
valentinak56 [21]

Answer:

A mechanical thermostat will typically use a bimetal strip with two different metals that expand/contract with the temperature at different rates.

Explanation:

7 0
2 years ago
The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
xxTIMURxx [149]

Answer:

inside a butt whole

Explanation:

3 0
3 years ago
Other questions:
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • To reboot a pc, hold down the ____ keys at the same time.
    15·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • By using the search functionality within a twitter stream, users can filter for:
    9·1 answer
  • What set operator would you use if you wanted to see all of the Customers and the Employees including any records that may appea
    14·1 answer
  • Any kind of brances in science
    13·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!