Answer:
Employers are allowed to check the number of keystrokes that word processors enter during the day.
Explanation:
An employer is authorized to monitor the activity of its employee when:
- The employee authorizes it.
- The employer owns the system to be used.
- Surveillance is necessary for a strictly professional purpose.
By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.
Answer:
Discretionary Access Control model
Explanation:
Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.
The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.
That should be the replace function which performs word replacements in documents.
Answer:
"backdoor" is the correct answer for the above question
Explanation:
- The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
- It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
- The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.