<span>command delete_all_rights(p, q, s)
delete read from a[q, s];
delete write from a[q, s];
delete execute from a[q, s];
delete append from a[q, s];
delete list from a[q, s];
delete modify from a[q, s];
delete own from a[q, s];
end</span>
Answer:
The correct answer to the following question will be "Flash memory card".
Explanation:
A flash memory card seems to be a storage (small) medium which stores data or information on fordable or remote devices using non-volatile transistor technology hardware.
- Most newer offerings include flash storage or memory chips, even though the development of other memory innovations is underway.
- This would be the storage mechanism from which the configuration tool was replicated by Thomas' friend.
Answer:
Correct option is B: Train the employees on why these issues are security concerns
Explanation:
When employees do not follow corporate guidelines regarding information systems and security, it is the duty of organizations to ensure that every employee knows the importance of following these guidelines due to the security risk the company might face. Hence, it is Henry's duty to ensure that he trains the employees on why their not following guidelines and looking at their personal emails are security concerns. This way he is sure that the employees are aware of the risks and any further breach in policy from them would require consequences.