Answer:
Personally would go with D.
Information being shared could be both good and bad but it all would be about the situation and if it was private information or not.
Answer:
While selecting the access control system (software or hardware), there are many factors that influence it and those factors are campus location, network capabilities, number of users using it, size of campus, the motive for using it, etc.
Explanation:
The access control system is electronic device that needs to be connected to the network for providing security control and authorization to the user to enter into the Campus.
Access control systems are used to control access into premises or any IT area which is control in two ways either in a physical way or a logical way.
Answer:
See attached picture.
Explanation:
See attached picture for detailed explanation.
They cannot legally check it without a warrant.
Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.
If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.
Marie could use a word processor for her documents of school writings to store important writing , help with test , and it would benefit her by knowing the important points of her documents . Could also benefit her by correcting mistakes , saving work to come back to , spelling and grammar checks , good formatting usage . hope this helps