1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o

n her computer that could be at risk of being stolen or breached?
Jorge is a writer for a local newspaper. He does not have an office and uses local cafes, etc. to write. He does use a tablet to access the newspaper's network. What type of data or information could Jorge have that could be at risk?

Wanda is a college professor at a local community college. She often works from her office and away from her home office at various locations when meeting with a student. She uses a tablet for checking e-mail and grading. Explain the type of data or information that Wanda has at risk?

Carl is a meter reader and travels over large areas of land everyday. He uses a laptop to check e-mail and connect to the company's network. What type of data might be stored on his laptop that could be at risk? What are ways he can protect the data?
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

You might be interested in
You are opening a store, and having a working website is an important part of your project plan. The company that started creati
Murljashka [212]
A should be the answer... not having the website will cause you to have to everything by call and things like that ... plz brainliest.
6 0
3 years ago
Kali, a Python programmer, is using the turtle module to write the word "hello." Which code should she use to indicate the locat
Sever21 [200]

Answer:

a) penup()

goto(-100, 200)

pendown()

Explanation:

The python program to indicate the location to begin writing the word can be

penup()

goto(-100, 200)

pendown()

# in python is use to add comment so it is incorrect.

all other option does not have correct syntex.

4 0
3 years ago
Read 2 more answers
The Java Math class is a collection of static methods, one of which is sqrt(number). It accepts a numeric argument and returns t
Sveta_85 [38]

In Java, you would simply type:

Math.sqrt(25);

To print the square root of 25 to the console, you would type:

System.out.println(Math.sqrt(25));

I hope this helps!

3 0
3 years ago
Read 2 more answers
For some reason my account wont let me answer a question on here or pick brainliest answer on a question i asked. How do i do th
podryga [215]
What type of device are you using?
7 0
3 years ago
Which of the following methods are available to deploy a Windows app that has been created within an organization and needs to b
VMariaS [17]

Answer:

a. Placing the app in the Windows Store.

c. Sideloading the app using Windows Intune.

Explanation:

Placing the app in the Windows Store and sideloading the app using Windows Intune are methods available to deploy a Windows app that has been created within an organization and needs to be deployed to the users.

5 0
3 years ago
Other questions:
  • Which icon will automatically adjust the amount of space between letters from very tight to very loose in style? Hyphenation, Te
    6·2 answers
  • At what depth does an employer need to use a protection system to ensure the safety of workers in a trench or excavation?
    8·2 answers
  • What are 7 good facts on Computer Viruses?
    10·1 answer
  • 1
    10·2 answers
  • A pair of single quotes ' will prevent the shell from interpreting any special character. True or False
    15·1 answer
  • Which if the following ribbons in Microsoft word is used to add tables and images
    14·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • Erewrxdnnefwn q wedsvd
    6·1 answer
  • Video is a medium that's looks real anyways, but is real________________.
    10·1 answer
  • Answer all of the questions,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!