Answer:(C) Anyone with access to the personal computers could log on to the mainframe.
Explanation:
It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.
Here we have to identify the associated risk with this approach.
This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.
option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.
option (B) is incorrect because it has nothing to do anything with training of the personnel.
option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.
Honestly gotta say cramming in an assignment doesnt help at all
Answer:
There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.
These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.
Explanation:
It is called D. destkop pulishing
With desktop publishing, people will had the options to choose a certain layout from the destkop publishing software that allow them to create high quality document in shorter period of time. This software allow individuals to publish on their own without the need of printing press.
Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.