Answer:
Amplification.
Explanation:
Social media publishing can be defined as a service that avails end users the ability to create or upload web contents in either textual, audio or video format in order to make them appealing to a target audience.
Thus, these web contents are generally accessed by end users from time to time through the use of various network-based devices. As users access these contents, they're presented with the option of sharing a particular content with several other people a number of times without any form of limitation.
Hence, the average numbers of shares a piece of content receives is known as its amplification. The higher the average numbers of shares a particular content receives, the higher the number of traffic it generates for its publisher.
Disk encryption is highly risky response.
<u>Explanation:</u>
To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.
Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.
Access or permission to application is removed so that mobile data loss can be avoided. End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.
Answer:
Correct Answer is (d) Information sensitivity policy
Explanation:
Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.
However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.
However, only information sensitivity policy is used for classifying and securing organization information to the outside world.
The intention of information sensitivity policy:
The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.
0=false
1=true
false + false = true
0+0=1
+ operator = and function
AND GATE
Solution:
It is done by Operating system.
An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.