Answer:
Sara: Personal data
Jorge : Personal data + official data.
Wanda: Personal data + students data
Carl: Personal data + official data
Explanation:
Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.
Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.
Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.
Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.
Answer:
Best: 1 or 4
Worst: 3
Explanation:
I'm not sure if number one is imply to ask your coworker to explain it or actually help with the workload. I think 4 would be the right answer because that is what they are there for and you don't want to distract your coworkers.
Answer: Protect the system with a password
Use spam protection.
Avoid using questionable software.
Explanation:
Answer:
Abstract
Objective Through a descriptive study, we determined the factors that influence the decision-making process for allocating funds to HIV/AIDS prevention and treatment programmes, and the extent to which formal decision tools are used in the municipality of KwaDukuza, South Africa.
Methods We conducted 35 key informant interviews in KwaDukuza. The interview questions addressed specific resource allocation issues while allowing respondents to speak openly about the complexities of the HIV/AIDS resource allocation process.
Answer: D) Whitelisting
Explanation:
Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.
Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.
Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.
Therefore, option (A) is correct.