Explanation:
A. personal computer
wait others answer for sure
Answer:
recognition
Explanation:
<h2><u>Fill in the blanks</u></h2>
When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.
Answer:
cryptography
Explanation:
cryptography
In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher
Answer:
The answer is "Need-To-Know Access Control Principle"
Explanation:
There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.
The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".
I hope this answer helps.
Answer:
A - 2
B - 3
C - 5
D - 4
E - 1
Explanation:
A. Virtual private network : 2
This is very useful when you have to work from home or visiting a client and need access to files/applications just like if you were at the office.
B. Email : 3
Yes, this is basically why the Internet was created in the first place.
C. Social networking sites : 5
Social networks are indeed a great marketing tool, allowing to target potential customers very precisely.
D. Search engines : 4
Yes, to find information about new products for the company, how the competitors are doing and so on.
E. Video and web conferencing: 1
Another great tool for employees working from home for example, or for employees located in an office at the other side of the country.