<span>Every information systems (IS) user has the right to a secure computing environment. this means that the </span>organization should protect his/her computer and its files.
Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
Answer:
See attached picture for complete code.
Explanation:
See attached picture.
Answer:
File manager
Explanation:
From the list of options 1 to 4, only option (2) is correct
Explaining the options one after the other
- Web browser: It lets users access the internet
- File Manager: Used to create and manage files/folders
- User Interface: Means which the user of a computer interacts with the computer
- File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.
Having explained the options one after the other, <em>the file manager </em>is the answer to this question.
Answer:
as me I choose managing user programs.
Explanation: