Answer:
D. Totals
Explanation:
Just like the microsoft excel spreadsheet, the microsoft access datasheet has similar tools. Although it is used to create and query databases, some functions carried out is excel can be done in access as well.
In the status bar at the bottom of the screen, certain parameter can be displayed for easy reference. If the totals or other statistical values needs to be included in the bottom status bar, go to the home tab and click on the "Totals" button.
Answer:
- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.
Explanation:
Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.
Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.
Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.
Use symbols and a different password for each one
Answer: team contract
Explanation:
A team contract is a document created when planning resource management to help promote teamwork and clarify team communications. This document helps to sort out which are the most important matters and needs more importance to be given.
It help to guide and give proper management of resources for a project or an organization. It also ensures that the members of the team abide by its set of rules defined within the team contract.