1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
3 years ago
15

Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)

he faxes a sensitive document to his supervisor using a fax machine with the appropriate clearance; 3) he confirms some appointments and project due dates and enters them into his PDA; and 4) he calls his supervisor on his cell phone to review the document he just faxed over. Which of Henrys actions was a mistake? A. Using a cell phone to discuss sensitive information.B. Using a complex password to log onto the computer.C. Downloading data to his PDA.D. Using a fax machine with the appropriate level of clearance to send the sensitive fax.
Computers and Technology
1 answer:
Ksivusya [100]3 years ago
3 0

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

You might be interested in
Let’s say you attach four images to accompany an important tweet that you’ve composed in the Hootsuite Compose Box. On Twitter,
Damm [24]
I doub between:

<span>  C)  A series of 4 full size, but individual tweets (with the tweet copy appearing above the first image of the series)  D)  A collage format, with full size images</span>

6 0
4 years ago
If you could create a social network, what would it be like? What would make it so special about the others? (If you want you ca
patriot [66]
Be able to contact and connect with other users. be able to share what your doing.
7 0
4 years ago
ASAP PLEASE
notka56 [123]
1st blank:task
2nd blank:transparency
6 0
3 years ago
Read 2 more answers
What is you full name ?​
Svetllana [295]

Answer:

Name: Whydoyouneedtoknow

8 0
3 years ago
Read 2 more answers
Need answer quick plz.
morpeh [17]

Answer:

SPSS

IS THE ANSWER

IHOPEIT WILL HELP YOU

4 0
3 years ago
Other questions:
  • 5) How have the wireless web and peer-to-peer networking helped small businesses compete with large corporations?
    15·2 answers
  • Drag the tiles to the correct boxes to complete the pairs.
    15·1 answer
  • How is multiprogramming implemented using virtual memory?
    10·1 answer
  • The index number of a combobox object can be assigned to a(n) ____ data type variable
    13·1 answer
  • How can I use internet if data is turned off​
    5·2 answers
  • (Display four patterns using loops) Ask the user to enter an integer to
    8·1 answer
  • 5. The image file format most suited for photographs is what? *
    8·2 answers
  • Which of the following correctly calculates the
    9·1 answer
  • With _________, it is easy to target a specific geographic location. Which answer completes the blank in the sentence?
    5·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!