Ella should view the presentation as a slideshow to see how it will look to her audience. 
        
                    
             
        
        
        
Answer:
See the explanation for the answer.
Explanation:
Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.
One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.
In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).
In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.
Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.
 
        
             
        
        
        
Answer:
The correct answer to the following question will be "Anonymous logon".
Explanation:
- Windows would never let anyone sign in interactively with an anonymous logon to the device, a person who has linked to the device without a login and password being given.
 - So they won't have to verify to an account of the user just whether you are running any shares.r document, let everyone log into the machine collaboratively with such a logon.
 
Therefore, Anonymous logon is the right answer.
 
        
             
        
        
        
The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.
<h3>What is  offence?</h3>
A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law. 
The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.
Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.
To learn more about violation, refer to:
brainly.com/question/1274113
#SPJ4
 
        
             
        
        
        
Algorithm is a written description of a computer program's functions.
Please mark me as brainliest. Thanks!!