1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o

n her computer that could be at risk of being stolen or breached?
Jorge is a writer for a local newspaper. He does not have an office and uses local cafes, etc. to write. He does use a tablet to access the newspaper's network. What type of data or information could Jorge have that could be at risk?

Wanda is a college professor at a local community college. She often works from her office and away from her home office at various locations when meeting with a student. She uses a tablet for checking e-mail and grading. Explain the type of data or information that Wanda has at risk?

Carl is a meter reader and travels over large areas of land everyday. He uses a laptop to check e-mail and connect to the company's network. What type of data might be stored on his laptop that could be at risk? What are ways he can protect the data?
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

You might be interested in
What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
kenny6666 [7]

The difference between a field and an infoobject as well as its advantages is given below.

<h3>What is the difference between InfoObject and adso?</h3>

The difference between Infoprovider and ADSO can be seen when we tell about the definition of both.

Note that Info Providers are known to be tools that are often used to save the data in SAP BW system. Info Providers are said to be the objects that can be seen in BW, which are saving data physically or virtually and it is one that give access to the data and can also be in the assessment for reporting issues.

In terms of ADSO , it is one that Corporate memory and it is one that helps a person to be able save the full history of the data that can be used for reconstruction purposes, and it is one where a person do not need to to extract it all from the source system.

<h3>What is the advantage of using infoobjects instead of fields in an adso?</h3>

Modeling InfoObjects brings is one that gives a lot of additional effort when compared to ADSO . ADSO is one that helps or enables you to be able to compress your data, thereby lowering the total data footprint.

Learn more about InfoObjects  from

brainly.com/question/1382377

#SPJ1

6 0
2 years ago
@anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
Readme [11.4K]
No problem I suppose...
7 0
3 years ago
Read 2 more answers
PLEASE HELP!
jonny [76]

1) True. Customized screens provide an easy way to enter and view data in a table and query called reports.

2) True. New Database can be created using a blank database.

3) False. Queries are used to find specific data.

4) True. When a new database is created, we can find more than one database objects.

5) False.  The primary key is to be set unique. As it identifies an entire row in the column.

1) Status Bar = Displays button to change the page views.

2) Hyper Link = A Link to an Internet Resource.

3) Field = Information arranged vertically in a table.

4) Report = Data from a table or query in printed format.

5) Record = Information arranged horizontally in a table.

8 0
2 years ago
The first character of the VIN designates which of the following? 
Dennis_Churaev [7]

country or origin is usually the first character of a vin #

7 0
4 years ago
Read 2 more answers
Can Any body Define what is search engine in a simple language quick please​
Komok [63]

Answer:

It is the SQL of WWW. Or in other words, it is the web tool that helps the users in locating the required information on the WWW. Various top search engines are like Google, MSN, and Yahoo. And the information that is gathered by the spider is used for creating the searchable index for the content on the web. This spider crawls according to the search engine algorithm and that is known as web crawling.

Explanation:

Please check the answer section.

6 0
3 years ago
Other questions:
  • An example of hardware is a _____. database spreadsheet monitor program used to enhance photos
    13·2 answers
  • What does snap do need the answer now
    10·2 answers
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • Write a loop to print 10 to 90 inclusive (this means it should include both the
    10·1 answer
  • Which examples demonstrate common education and qualifications for Manufacturing Production Process Development careers? Check a
    12·2 answers
  • When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequen
    15·1 answer
  • Match the elements used in web searches to their functions.
    12·1 answer
  • A rectangle indicates a single process.true or false​
    7·2 answers
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!