Answer:
1. terry: computer worm
2. _ biggest risk: Natural disasters
3. William is working with data: procedural error
4. infamous e-mail: phishing
5. intentional/ unintentional threats: harmful purpose/ not harmful
6._ would result in systems brought down: Denial-of-service attacks
7. which doesn't require a security plan: all of them do
8. Blaire is the director: procedures
9. handling of workstations: hardware
10. which is not an example of software security: data backups
Explanation:
The questions were in a different order for me, so I tried to specify.
Answer:
Cited work list is usually appears <u>at the end</u> of the document.
Explanation:
In formal documents, the work from other authors and document has been used to validate our work. we explain their work in our document and with the support of that t work we tries to validate the work that we are doing. This work is written in our document that is called cited work or reference. Each of the cited work is written in different paragraphs and assigned a number at the end of citation in ascending order.
At the end of the document, we quote the document reference where it has been published online in same order as in document. This list of cited works is appears at the end of the document called references and Bibliography.
Answer:
Changing Margins
Selecting the Printer
Viewing a preview
Selecting the pages to print
Changing the page orientation
Explanation:
They add clarifying information to a document. They provide details the reader may be unfamiliar with, and saving them from having to look them up (words, places or sources.)