1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o

n her computer that could be at risk of being stolen or breached?
Jorge is a writer for a local newspaper. He does not have an office and uses local cafes, etc. to write. He does use a tablet to access the newspaper's network. What type of data or information could Jorge have that could be at risk?

Wanda is a college professor at a local community college. She often works from her office and away from her home office at various locations when meeting with a student. She uses a tablet for checking e-mail and grading. Explain the type of data or information that Wanda has at risk?

Carl is a meter reader and travels over large areas of land everyday. He uses a laptop to check e-mail and connect to the company's network. What type of data might be stored on his laptop that could be at risk? What are ways he can protect the data?
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

You might be interested in
Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
Ann [662]

Answer:  USB-C

I am 99.5% sure bcuz Im about 90 % because HDMI goes into TVs and stuff

4 0
3 years ago
Read 2 more answers
What is the major benefit Smartphones and tablet computers have had on social media?
Naddika [18.5K]

Answer:

c

Explanation:

The biggest advantage of smartphones and tablets is that they increased the mobility. This allowed users to access the social media platforms whenever they want. The users can login to their accounts even they are travelling by bus or walking around. This was not possible back in the days where people mostly use desktop computers.

8 0
3 years ago
Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
lubasha [3.4K]

Answer:

all

Explanation:

4 0
3 years ago
What is impact of Internet<br> in our lives
NeTakaya

Answer:

The Internet has changed business, education, government, healthcare, and even the ways in which we interact with our loved ones—it has become one of the key drivers of social evolution. The changes in social communication are of particular significance.

7 0
3 years ago
The Securities and Exchange Commission (SEC) was created to develop and approve a set of common international accounting rules.
Dennis_Churaev [7]

Answer:  

Idk search it on google chrome

Explanation:

3 0
3 years ago
Other questions:
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • THE bestValue PROBLEM Using the Camera structure defined in file p1.cpp, write the function named bestValue(). The function take
    13·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • 3.24 LAB: Seasons
    13·1 answer
  • How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
    14·1 answer
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • Write a program to read a list of exam scores given as integer percentages in the range 0-100. Display the total number of grade
    10·1 answer
  • What is project scope? a. Quantifiable criteria that must be met for the project to be considered a success b. Products, service
    5·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • Consider the following statements regarding computers:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!